diff --git a/.openapi-generator/FILES b/.openapi-generator/FILES index 16e8911..0303484 100644 --- a/.openapi-generator/FILES +++ b/.openapi-generator/FILES @@ -308,6 +308,7 @@ docs/AdvisoryGreyNoiseTags.md docs/AdvisoryHCL.md docs/AdvisoryHIKVision.md docs/AdvisoryHKCert.md +docs/AdvisoryHMS.md docs/AdvisoryHP.md docs/AdvisoryHPE.md docs/AdvisoryHacktivity.md @@ -542,6 +543,7 @@ docs/AdvisoryRThreat.md docs/AdvisoryRange.md docs/AdvisoryRansomwareExploit.md docs/AdvisoryRecordType.md +docs/AdvisoryRedLion.md docs/AdvisoryRedhatCVE.md docs/AdvisoryReference.md docs/AdvisoryRelatedRule.md @@ -1039,6 +1041,7 @@ docs/RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination docs/RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination.md +docs/RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination.md @@ -1173,6 +1176,7 @@ docs/RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination.md +docs/RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination.md docs/RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination.md @@ -1644,6 +1648,7 @@ test/test_advisory_hillrom_advisory.py test/test_advisory_hitachi.py test/test_advisory_hitachi_energy.py test/test_advisory_hk_cert.py +test/test_advisory_hms.py test/test_advisory_honeywell.py test/test_advisory_hp.py test/test_advisory_hpe.py @@ -1868,6 +1873,7 @@ test/test_advisory_r_threat.py test/test_advisory_range.py test/test_advisory_ransomware_exploit.py test/test_advisory_record_type.py +test/test_advisory_red_lion.py test/test_advisory_redhat_cve.py test/test_advisory_reference.py test/test_advisory_related_rule.py @@ -2372,6 +2378,7 @@ test/test_render_response_with_metadata_array_advisory_hillrom_advisory_paginate test/test_render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py +test/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_hp_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_hpe_paginate_pagination.py @@ -2499,6 +2506,7 @@ test/test_render_response_with_metadata_array_advisory_qualcomm_paginate_paginat test/test_render_response_with_metadata_array_advisory_qualys_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py +test/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py test/test_render_response_with_metadata_array_advisory_revive_paginate_pagination.py @@ -2973,6 +2981,7 @@ vulncheck_sdk/models/advisory_hillrom_advisory.py vulncheck_sdk/models/advisory_hitachi.py vulncheck_sdk/models/advisory_hitachi_energy.py vulncheck_sdk/models/advisory_hk_cert.py +vulncheck_sdk/models/advisory_hms.py vulncheck_sdk/models/advisory_honeywell.py vulncheck_sdk/models/advisory_hp.py vulncheck_sdk/models/advisory_hpe.py @@ -3197,6 +3206,7 @@ vulncheck_sdk/models/advisory_r_threat.py vulncheck_sdk/models/advisory_range.py vulncheck_sdk/models/advisory_ransomware_exploit.py vulncheck_sdk/models/advisory_record_type.py +vulncheck_sdk/models/advisory_red_lion.py vulncheck_sdk/models/advisory_redhat_cve.py vulncheck_sdk/models/advisory_reference.py vulncheck_sdk/models/advisory_related_rule.py @@ -3699,6 +3709,7 @@ vulncheck_sdk/models/render_response_with_metadata_array_advisory_hillrom_adviso vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py +vulncheck_sdk/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_hp_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_hpe_paginate_pagination.py @@ -3826,6 +3837,7 @@ vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualcomm_pagin vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py +vulncheck_sdk/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_renesas_paginate_pagination.py vulncheck_sdk/models/render_response_with_metadata_array_advisory_revive_paginate_pagination.py diff --git a/docs/AdvisoryHMS.md b/docs/AdvisoryHMS.md new file mode 100644 index 0000000..3d29f44 --- /dev/null +++ b/docs/AdvisoryHMS.md @@ -0,0 +1,38 @@ +# AdvisoryHMS + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**affected_products** | **str** | | [optional] +**cve** | **List[str]** | | [optional] +**date_added** | **str** | | [optional] +**id** | **str** | | [optional] +**impact** | **str** | | [optional] +**mitigation** | **str** | | [optional] +**summary** | **str** | | [optional] +**title** | **str** | | [optional] +**updated_at** | **str** | | [optional] +**url** | **str** | | [optional] + +## Example + +```python +from vulncheck_sdk.models.advisory_hms import AdvisoryHMS + +# TODO update the JSON string below +json = "{}" +# create an instance of AdvisoryHMS from a JSON string +advisory_hms_instance = AdvisoryHMS.from_json(json) +# print the JSON string representation of the object +print(AdvisoryHMS.to_json()) + +# convert the object into a dict +advisory_hms_dict = advisory_hms_instance.to_dict() +# create an instance of AdvisoryHMS from a dict +advisory_hms_from_dict = AdvisoryHMS.from_dict(advisory_hms_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AdvisoryRedLion.md b/docs/AdvisoryRedLion.md new file mode 100644 index 0000000..8ecb9fa --- /dev/null +++ b/docs/AdvisoryRedLion.md @@ -0,0 +1,33 @@ +# AdvisoryRedLion + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**cve** | **List[str]** | | [optional] +**date_added** | **str** | | [optional] +**title** | **str** | | [optional] +**updated_at** | **str** | | [optional] +**url** | **str** | | [optional] + +## Example + +```python +from vulncheck_sdk.models.advisory_red_lion import AdvisoryRedLion + +# TODO update the JSON string below +json = "{}" +# create an instance of AdvisoryRedLion from a JSON string +advisory_red_lion_instance = AdvisoryRedLion.from_json(json) +# print the JSON string representation of the object +print(AdvisoryRedLion.to_json()) + +# convert the object into a dict +advisory_red_lion_dict = advisory_red_lion_instance.to_dict() +# create an instance of AdvisoryRedLion from a dict +advisory_red_lion_from_dict = AdvisoryRedLion.from_dict(advisory_red_lion_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/IndicesApi.md b/docs/IndicesApi.md index 9f4fc29..5619c72 100644 --- a/docs/IndicesApi.md +++ b/docs/IndicesApi.md @@ -218,6 +218,7 @@ Method | HTTP request | Description [**index_hitachi_energy_get**](IndicesApi.md#index_hitachi_energy_get) | **GET** /index/hitachi-energy | Return vulnerability data stored in index \"hitachi-energy\" [**index_hitachi_get**](IndicesApi.md#index_hitachi_get) | **GET** /index/hitachi | Return vulnerability data stored in index \"hitachi\" [**index_hkcert_get**](IndicesApi.md#index_hkcert_get) | **GET** /index/hkcert | Return vulnerability data stored in index \"hkcert\" +[**index_hms_get**](IndicesApi.md#index_hms_get) | **GET** /index/hms | Return vulnerability data stored in index \"hms\" [**index_honeywell_get**](IndicesApi.md#index_honeywell_get) | **GET** /index/honeywell | Return vulnerability data stored in index \"honeywell\" [**index_hp_get**](IndicesApi.md#index_hp_get) | **GET** /index/hp | Return vulnerability data stored in index \"hp\" [**index_hpe_get**](IndicesApi.md#index_hpe_get) | **GET** /index/hpe | Return vulnerability data stored in index \"hpe\" @@ -361,6 +362,7 @@ Method | HTTP request | Description [**index_qualys_qids_get**](IndicesApi.md#index_qualys_qids_get) | **GET** /index/qualys-qids | Return vulnerability data stored in index \"qualys-qids\" [**index_qubes_qsb_get**](IndicesApi.md#index_qubes_qsb_get) | **GET** /index/qubes-qsb | Return vulnerability data stored in index \"qubes-qsb\" [**index_ransomware_get**](IndicesApi.md#index_ransomware_get) | **GET** /index/ransomware | Return vulnerability data stored in index \"ransomware\" +[**index_red_lion_get**](IndicesApi.md#index_red_lion_get) | **GET** /index/red-lion | Return vulnerability data stored in index \"red-lion\" [**index_redhat_cves_get**](IndicesApi.md#index_redhat_cves_get) | **GET** /index/redhat-cves | Return vulnerability data stored in index \"redhat-cves\" [**index_redhat_get**](IndicesApi.md#index_redhat_get) | **GET** /index/redhat | Return vulnerability data stored in index \"redhat\" [**index_renesas_get**](IndicesApi.md#index_renesas_get) | **GET** /index/renesas | Return vulnerability data stored in index \"renesas\" @@ -29593,6 +29595,142 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **index_hms_get** +> RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + +Return vulnerability data stored in index \"hms\" + +### Overview +This endpoint allows you to retrieve a paginated list of all documents from the hms index. \ +By default, a maximum of 100 documents are shown per page. + +**Index Description:** HMS (Hardware Meets Software) Security Advisories + +### Paging Over Large Data (cursor) +In order to allow users to iterate over large index datasets, this endpoint provides a server-side +"cursor" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will +have a `next_cursor` id that clients will need to pass as a query parameter to the next request like +`GET /index/hms?cursor=` + + +### Example + +* Api Key Authentication (Bearer): + +```python +import vulncheck_sdk +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hms_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination +from vulncheck_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to /v3 +# See configuration.py for a list of all supported configuration parameters. +configuration = vulncheck_sdk.Configuration( + host = "/v3" +) + +# The client must configure the authentication and authorization parameters +# in accordance with the API server security policy. +# Examples for each auth method are provided below, use the example that +# satisfies your auth use case. + +# Configure API key authorization: Bearer +configuration.api_key['Bearer'] = os.environ["API_KEY"] + +# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed +# configuration.api_key_prefix['Bearer'] = 'Bearer' + +# Enter a context with an instance of the API client +with vulncheck_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = vulncheck_sdk.IndicesApi(api_client) + page = 56 # int | set the page number of the response (optional) + limit = 56 # int | limit the number of findings in the response (optional) + cursor = 'cursor_example' # str | continue server-side paging using a cursor id (optional) + start_cursor = 'start_cursor_example' # str | request server-side paging (optional) + cve = 'cve_example' # str | Specify a CVE ID to search with. (optional) + alias = 'alias_example' # str | Specify a vulnerability alias to search with. (optional) + iava = 'iava_example' # str | Specify an IAVA ID to search with. (optional) + jvndb = 'jvndb_example' # str | Specify a JVNDB ID to search with. (optional) + ilvn = 'ilvn_example' # str | Specify an ILVN ID to search with. (optional) + threat_actor = 'threat_actor_example' # str | Specify a threat actor name to search with. (optional) + mitre_id = 'mitre_id_example' # str | Specify a MITRE ID to search with. (optional) + misp_id = 'misp_id_example' # str | Specify a MISP ID to search with. (optional) + ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) + botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) + published = 'published_example' # str | Specify a published date (optional) + var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) + var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) + updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) + last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) + last_mod_end_date = 'last_mod_end_date_example' # str | Specify an ending last modified date to filter with. (optional) + pub_start_date = 'pub_start_date_example' # str | Specify a starting published date to filter with. (optional) + pub_end_date = 'pub_end_date_example' # str | Specify an ending published date to filter with. (optional) + + try: + # Return vulnerability data stored in index \"hms\" + api_response = api_instance.index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + print("The response of IndicesApi->index_hms_get:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling IndicesApi->index_hms_get: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **page** | **int**| set the page number of the response | [optional] + **limit** | **int**| limit the number of findings in the response | [optional] + **cursor** | **str**| continue server-side paging using a cursor id | [optional] + **start_cursor** | **str**| request server-side paging | [optional] + **cve** | **str**| Specify a CVE ID to search with. | [optional] + **alias** | **str**| Specify a vulnerability alias to search with. | [optional] + **iava** | **str**| Specify an IAVA ID to search with. | [optional] + **jvndb** | **str**| Specify a JVNDB ID to search with. | [optional] + **ilvn** | **str**| Specify an ILVN ID to search with. | [optional] + **threat_actor** | **str**| Specify a threat actor name to search with. | [optional] + **mitre_id** | **str**| Specify a MITRE ID to search with. | [optional] + **misp_id** | **str**| Specify a MISP ID to search with. | [optional] + **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] + **botnet** | **str**| Specify a botnet name to search with. | [optional] + **published** | **str**| Specify a published date | [optional] + **var_date** | **str**| Specify a starting published date to filter with. | [optional] + **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] + **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] + **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] + **last_mod_end_date** | **str**| Specify an ending last modified date to filter with. | [optional] + **pub_start_date** | **str**| Specify a starting published date to filter with. | [optional] + **pub_end_date** | **str**| Specify an ending published date to filter with. | [optional] + +### Return type + +[**RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination**](RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md) + +### Authorization + +[Bearer](../README.md#Bearer) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | OK | - | +**404** | Not Found | - | +**500** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **index_honeywell_get** > RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination index_honeywell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) @@ -49081,6 +49219,142 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **index_red_lion_get** +> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + +Return vulnerability data stored in index \"red-lion\" + +### Overview +This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \ +By default, a maximum of 100 documents are shown per page. + +**Index Description:** Red-Lion Security Advisories + +### Paging Over Large Data (cursor) +In order to allow users to iterate over large index datasets, this endpoint provides a server-side +"cursor" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will +have a `next_cursor` id that clients will need to pass as a query parameter to the next request like +`GET /index/red-lion?cursor=` + + +### Example + +* Api Key Authentication (Bearer): + +```python +import vulncheck_sdk +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_red_lion_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination +from vulncheck_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to /v3 +# See configuration.py for a list of all supported configuration parameters. +configuration = vulncheck_sdk.Configuration( + host = "/v3" +) + +# The client must configure the authentication and authorization parameters +# in accordance with the API server security policy. +# Examples for each auth method are provided below, use the example that +# satisfies your auth use case. + +# Configure API key authorization: Bearer +configuration.api_key['Bearer'] = os.environ["API_KEY"] + +# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed +# configuration.api_key_prefix['Bearer'] = 'Bearer' + +# Enter a context with an instance of the API client +with vulncheck_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = vulncheck_sdk.IndicesApi(api_client) + page = 56 # int | set the page number of the response (optional) + limit = 56 # int | limit the number of findings in the response (optional) + cursor = 'cursor_example' # str | continue server-side paging using a cursor id (optional) + start_cursor = 'start_cursor_example' # str | request server-side paging (optional) + cve = 'cve_example' # str | Specify a CVE ID to search with. (optional) + alias = 'alias_example' # str | Specify a vulnerability alias to search with. (optional) + iava = 'iava_example' # str | Specify an IAVA ID to search with. (optional) + jvndb = 'jvndb_example' # str | Specify a JVNDB ID to search with. (optional) + ilvn = 'ilvn_example' # str | Specify an ILVN ID to search with. (optional) + threat_actor = 'threat_actor_example' # str | Specify a threat actor name to search with. (optional) + mitre_id = 'mitre_id_example' # str | Specify a MITRE ID to search with. (optional) + misp_id = 'misp_id_example' # str | Specify a MISP ID to search with. (optional) + ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) + botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) + published = 'published_example' # str | Specify a published date (optional) + var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) + var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) + updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) + last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) + last_mod_end_date = 'last_mod_end_date_example' # str | Specify an ending last modified date to filter with. (optional) + pub_start_date = 'pub_start_date_example' # str | Specify a starting published date to filter with. (optional) + pub_end_date = 'pub_end_date_example' # str | Specify an ending published date to filter with. (optional) + + try: + # Return vulnerability data stored in index \"red-lion\" + api_response = api_instance.index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + print("The response of IndicesApi->index_red_lion_get:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling IndicesApi->index_red_lion_get: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **page** | **int**| set the page number of the response | [optional] + **limit** | **int**| limit the number of findings in the response | [optional] + **cursor** | **str**| continue server-side paging using a cursor id | [optional] + **start_cursor** | **str**| request server-side paging | [optional] + **cve** | **str**| Specify a CVE ID to search with. | [optional] + **alias** | **str**| Specify a vulnerability alias to search with. | [optional] + **iava** | **str**| Specify an IAVA ID to search with. | [optional] + **jvndb** | **str**| Specify a JVNDB ID to search with. | [optional] + **ilvn** | **str**| Specify an ILVN ID to search with. | [optional] + **threat_actor** | **str**| Specify a threat actor name to search with. | [optional] + **mitre_id** | **str**| Specify a MITRE ID to search with. | [optional] + **misp_id** | **str**| Specify a MISP ID to search with. | [optional] + **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] + **botnet** | **str**| Specify a botnet name to search with. | [optional] + **published** | **str**| Specify a published date | [optional] + **var_date** | **str**| Specify a starting published date to filter with. | [optional] + **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] + **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] + **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] + **last_mod_end_date** | **str**| Specify an ending last modified date to filter with. | [optional] + **pub_start_date** | **str**| Specify a starting published date to filter with. | [optional] + **pub_end_date** | **str**| Specify an ending published date to filter with. | [optional] + +### Return type + +[**RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination**](RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md) + +### Authorization + +[Bearer](../README.md#Bearer) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | OK | - | +**404** | Not Found | - | +**500** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **index_redhat_cves_get** > RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination index_redhat_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md new file mode 100644 index 0000000..4ad425a --- /dev/null +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md @@ -0,0 +1,31 @@ +# RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**benchmark** | **float** | | [optional] +**meta** | [**PaginatePagination**](PaginatePagination.md) | | [optional] +**data** | [**List[AdvisoryHMS]**](AdvisoryHMS.md) | | [optional] + +## Example + +```python +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hms_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination + +# TODO update the JSON string below +json = "{}" +# create an instance of RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination from a JSON string +render_response_with_metadata_array_advisory_hms_paginate_pagination_instance = RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.from_json(json) +# print the JSON string representation of the object +print(RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.to_json()) + +# convert the object into a dict +render_response_with_metadata_array_advisory_hms_paginate_pagination_dict = render_response_with_metadata_array_advisory_hms_paginate_pagination_instance.to_dict() +# create an instance of RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination from a dict +render_response_with_metadata_array_advisory_hms_paginate_pagination_from_dict = RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.from_dict(render_response_with_metadata_array_advisory_hms_paginate_pagination_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md new file mode 100644 index 0000000..4b8d622 --- /dev/null +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md @@ -0,0 +1,31 @@ +# RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**benchmark** | **float** | | [optional] +**meta** | [**PaginatePagination**](PaginatePagination.md) | | [optional] +**data** | [**List[AdvisoryRedLion]**](AdvisoryRedLion.md) | | [optional] + +## Example + +```python +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_red_lion_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination + +# TODO update the JSON string below +json = "{}" +# create an instance of RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination from a JSON string +render_response_with_metadata_array_advisory_red_lion_paginate_pagination_instance = RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.from_json(json) +# print the JSON string representation of the object +print(RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.to_json()) + +# convert the object into a dict +render_response_with_metadata_array_advisory_red_lion_paginate_pagination_dict = render_response_with_metadata_array_advisory_red_lion_paginate_pagination_instance.to_dict() +# create an instance of RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination from a dict +render_response_with_metadata_array_advisory_red_lion_paginate_pagination_from_dict = RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.from_dict(render_response_with_metadata_array_advisory_red_lion_paginate_pagination_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/openapi.json b/openapi.json index fb42708..a459bb9 100644 --- a/openapi.json +++ b/openapi.json @@ -1 +1 @@ -{"basePath":"/v3","definitions":{"advisory.A10":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"reference":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array"},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"metrics":{"items":{"$ref":"#/definitions/advisory.VulnrichmentMetric"},"type":"array"},"providerMetadata":{"$ref":"#/definitions/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"},"impacts":{"description":"OK","items":{"$ref":"#/definitions/advisory.Impact"},"type":"array"},"metrics":{"description":"OK","items":{"$ref":"#/definitions/advisory.Metric"},"type":"array"},"problemTypes":{"description":"OK","items":{"$ref":"#/definitions/advisory.MProblemTypes"},"type":"array"},"providerMetadata":{"allOf":[{"$ref":"#/definitions/advisory.MProviderMetadata"}],"description":"OK"},"references":{"items":{"$ref":"#/definitions/advisory.MReference"},"type":"array"},"tags":{"description":"OK","items":{"type":"string"},"type":"array"},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"properties":{"name":{"items":{"$ref":"#/definitions/advisory.IVal"},"type":"array"},"url":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Acronis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"properties":{"adobe_cves":{"items":{"$ref":"#/definitions/advisory.AdobeCVE"},"type":"array"},"affected":{"items":{"$ref":"#/definitions/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/definitions/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/definitions/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"properties":{"bugzilla":{"$ref":"#/definitions/advisory.Bugzilla"},"cve":{"$ref":"#/definitions/advisory.OvalCVE"},"issued":{"$ref":"#/definitions/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/definitions/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array"},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/definitions/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.Range"},"type":"array"},"severity":{"items":{"$ref":"#/definitions/advisory.Severity"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AffectedChrome":{"properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/definitions/advisory.AffectedDebianRepository"},"type":"array"},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"properties":{"break_commit_url":{"items":{"type":"string"},"type":"array"},"fix_commit_url":{"items":{"type":"string"},"type":"array"},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/definitions/advisory.UbuntuPackageReleaseStatus"},"type":"array"},"upstream_fix_url":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AlephResearch":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"properties":{"cnnvd":{"items":{"type":"string"},"type":"array"},"cnvd":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"properties":{"bs_repo_id":{"$ref":"#/definitions/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/definitions/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/definitions/advisory.AlmaDate"},"pkglist":{"$ref":"#/definitions/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.AlmaReference"},"type":"array"},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/definitions/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.AlmaPackage"},"type":"array"},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecDBPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecurityFix"},"type":"array"}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AmazonAffectedPackage"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"override":{"$ref":"#/definitions/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AndroidAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.AndroidReference"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"properties":{"ecosystem_specific":{"$ref":"#/definitions/advisory.EcoSystem"},"package":{"$ref":"#/definitions/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.AndroidRange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AndroidEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.AndroidEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.ApacheSubversion":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"properties":{"components":{"items":{"$ref":"#/definitions/advisory.AppleComponent"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"properties":{"bdu":{"items":{"type":"string"},"type":"array"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"properties":{"affected_version":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/definitions/advisory.AtlassianProducts"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Audiocodes":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/definitions/advisory.PrimeVersion"},"type":"array"},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/definitions/advisory.ZuluVersion"},"type":"array"}},"type":"object"},"advisory.BBraunAdvisory":{"properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.BDUAdvisory":{"properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array"},"cvss":{"$ref":"#/definitions/advisory.BDUCvss"},"cvss3":{"$ref":"#/definitions/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/definitions/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array"},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/definitions/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"properties":{"vector":{"$ref":"#/definitions/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"properties":{"vector":{"$ref":"#/definitions/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"properties":{"os":{"$ref":"#/definitions/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/definitions/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"properties":{"soft":{"$ref":"#/definitions/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.BeckmanCoulter":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/definitions/advisory.ProductsAffected"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"}},"type":"object"},"advisory.Bugzilla":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"properties":{"affectedProducts":{"type":"string"},"alertID":{"type":"string"},"archived":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"cveexploitedITW":{"type":"boolean"},"cvss":{"type":"string"},"date_added":{"type":"string"},"icsa":{"type":"boolean"},"icsma":{"type":"boolean"},"mitigations":{"type":"string"},"releaseDate":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.CISControl":{"properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array"},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array"},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"properties":{"changed":{"items":{"type":"string"},"type":"array"},"featured":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array"},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.CPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"properties":{"document":{"allOf":[{"$ref":"#/definitions/advisory.DocumentMetadata"}],"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"product_tree":{"allOf":[{"$ref":"#/definitions/advisory.ProductBranch"}],"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/definitions/advisory.CSAFVulnerability"},"type":"array"}},"type":"object"},"advisory.CSAFDistribution":{"type":"object"},"advisory.CSAFNote":{"properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/definitions/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"properties":{"cvss_v2":{"$ref":"#/definitions/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/definitions/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CSAFVulnerability":{"properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/definitions/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/definitions/advisory.Flag"},"type":"array"},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/definitions/advisory.TrackingID"},"type":"array"},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/definitions/advisory.CSAFReference"},"type":"array"},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/definitions/advisory.RemediationData"},"type":"array"},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/definitions/advisory.CSAFScore"},"type":"array"},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/definitions/advisory.ThreatData"},"type":"array"}},"type":"object"},"advisory.CVEDetail":{"properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVRFReference":{"properties":{"description":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"properties":{"cweid":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CanvasExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"properties":{"affected_software":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CertFRAdvisory":{"properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.ChainGuardPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.ChainGuardSecFix"},"type":"array"}},"type":"object"},"advisory.ChainGuardSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AffectedChrome"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"properties":{"cves":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/definitions/advisory.VulnerableProduct"},"type":"array"}},"type":"object"},"advisory.CisaCsafAdv":{"properties":{"csaf_json":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array"},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cve_details":{"items":{"$ref":"#/definitions/advisory.CommVaultCVEDetails"},"type":"array"},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/definitions/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array"},"resolution":{"$ref":"#/definitions/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CommVaultImpactedProduct":{"properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/definitions/advisory.CommVaultImpactedProductDetails"},"type":"array"}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array"},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/definitions/advisory.CommVaultResolutionDetails"},"type":"array"}},"type":"object"},"advisory.CommVaultResolutionDetails":{"properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/definitions/advisory.COSUpdate"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"info":{"$ref":"#/definitions/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"properties":{"ranges":{"items":{"$ref":"#/definitions/advisory.CurlRange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CurlCWE":{"properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array"},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"notes":{"items":{"$ref":"#/definitions/advisory.DocumentNote"},"type":"array"},"productTree":{"$ref":"#/definitions/advisory.ProductTree"},"references":{"items":{"$ref":"#/definitions/advisory.CVRFReference"},"type":"array"},"title":{"type":"string"},"tracking":{"$ref":"#/definitions/advisory.DocumentTracking"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.Vulnerability"},"type":"array"}},"type":"object"},"advisory.CvsssV2_3":{"properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.CWENode"},"type":"array"},"totalCount":{"type":"integer"}},"type":"object"},"advisory.Cycle":{"properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"properties":{"CWE":{"$ref":"#/definitions/advisory.CurlCWE"},"award":{"$ref":"#/definitions/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_details":{"items":{"$ref":"#/definitions/advisory.DanFossCVEDetails"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.DebianCVE":{"properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/definitions/advisory.AffectedDebianRelease"},"type":"array"},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"properties":{"affected_packages":{"items":{"$ref":"#/definitions/advisory.AffectedDebianPackage"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/definitions/advisory.DellCVE"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"license":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/definitions/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/definitions/advisory.DistroVersion"},"type":"array"}},"type":"object"},"advisory.DistroVersion":{"properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/definitions/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"publisher":{"$ref":"#/definitions/advisory.Publisher"},"references":{"items":{"$ref":"#/definitions/advisory.CSAFReference"},"type":"array"},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/definitions/advisory.Tracking"}},"type":"object"},"advisory.DocumentNote":{"properties":{"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.DocumentPublisher":{"properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DocumentTracking":{"properties":{"currentReleaseDate":{"type":"string"},"id":{"type":"string"},"initialReleaseDate":{"type":"string"},"revisionHistory":{"items":{"$ref":"#/definitions/advisory.Revision"},"type":"array"},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.DotCMS":{"properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Draytek":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array"},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/definitions/advisory.EnisaIDProduct"},"type":"array"},"enisa_id_vendor":{"items":{"$ref":"#/definitions/advisory.EnisaIDVendor"},"type":"array"},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cycles":{"items":{"$ref":"#/definitions/advisory.Cycle"},"type":"array"},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array"},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.FlattSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.FoxitAffected"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"$ref":"#/definitions/advisory.GHCvss"},"cwes":{"$ref":"#/definitions/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/definitions/advisory.GHIdentifier"},"type":"array"},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GHReference"},"type":"array"},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/definitions/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"properties":{"package":{"$ref":"#/definitions/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"ghsa":{"$ref":"#/definitions/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"properties":{"ecosystem_specific":{"$ref":"#/definitions/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/definitions/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.GHSARange"},"type":"array"}},"type":"object"},"advisory.GHSADatabaseSpecific":{"properties":{"cwe_ids":{"items":{"type":"string"},"type":"array"},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"properties":{"affected_functions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.GHSAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.GHSAEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.GHNode"},"type":"array"},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Genetec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array"},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array"},"ghsa":{"items":{"type":"string"},"type":"array"},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array"},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array"},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"properties":{"database_specific":{"$ref":"#/definitions/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/definitions/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/definitions/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.GoVulnRanges"},"type":"array"}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"properties":{"imports":{"items":{"$ref":"#/definitions/advisory.GoVulnImport"},"type":"array"}},"type":"object"},"advisory.GoVulnImport":{"properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.GoVulnJSON":{"properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/definitions/advisory.GoVulnAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.GoCredits"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array"},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GoVulnReference"},"type":"array"}},"type":"object"},"advisory.GoVulnPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.GoEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array"},"related_tags":{"items":{"$ref":"#/definitions/advisory.GreyNoiseTags"},"type":"array"},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/definitions/advisory.HaskellVersion"},"type":"array"},"arch":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array"},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/definitions/advisory.HaskellAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"integer"},"type":"array"},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array"},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.HaskellVersion":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.IBM":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":true,"type":"object"},"advisory.Igel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"}},"type":"object"},"advisory.IncibeAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"feed_ids":{"items":{"type":"string"},"type":"array"},"hostnames":{"items":{"type":"string"},"type":"array"},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array"},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/definitions/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.Istio":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"properties":{"cpes":{"items":{"$ref":"#/definitions/advisory.NVD20CVECPEMatch"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.JNJAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"properties":{"cpe":{"items":{"$ref":"#/definitions/advisory.JVNCPE"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"items":{"$ref":"#/definitions/advisory.CVSS"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.JVNReference"},"type":"array"},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array"},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.KoreLogic":{"properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array"},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"properties":{"affectedProducts":{"items":{"$ref":"#/definitions/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array"},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array"},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/definitions/advisory.MVersion"},"type":"array"}},"type":"object"},"advisory.MBranch":{"properties":{"Branch":{"items":{"$ref":"#/definitions/advisory.MBranch"},"type":"array"},"FullProductName":{"items":{"$ref":"#/definitions/advisory.MFullProductName"},"type":"array"},"Items":{"items":{"$ref":"#/definitions/advisory.MItem"},"type":"array"},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/definitions/advisory.MNodes"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"cpeApplicability":{"items":{"$ref":"#/definitions/advisory.MCPEApplicability"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.Credit"},"type":"array"},"descriptions":{"items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"},"impacts":{"items":{"$ref":"#/definitions/advisory.Impact"},"type":"array"},"metrics":{"items":{"$ref":"#/definitions/advisory.Metric"},"type":"array"},"problemTypes":{"items":{"$ref":"#/definitions/advisory.MProblemTypes"},"type":"array"},"providerMetadata":{"$ref":"#/definitions/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/definitions/advisory.MReference"},"type":"array"},"tags":{"items":{"type":"string"},"type":"array"},"timeline":{"items":{"$ref":"#/definitions/advisory.Timeline"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"properties":{"adp":{"items":{"$ref":"#/definitions/advisory.ADPContainer"},"type":"array"},"cna":{"$ref":"#/definitions/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/definitions/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/definitions/advisory.RRevision"},"type":"array"},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/definitions/advisory.MispMeta"},"related":{"items":{"$ref":"#/definitions/advisory.MispRelatedItem"},"type":"array"},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechnique"},"type":"array"}},"type":"object"},"advisory.MIdentification":{"properties":{"alias":{"$ref":"#/definitions/advisory.IVal"},"id":{"$ref":"#/definitions/advisory.IVal"}},"type":"object"},"advisory.MItem":{"properties":{"Items":{"items":{"$ref":"#/definitions/advisory.MItem"},"type":"array"},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.MCPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"properties":{"descriptions":{"items":{"$ref":"#/definitions/advisory.PTMDescriptions"},"type":"array"}},"type":"object"},"advisory.MProductStatus":{"properties":{"ProductID":{"items":{"type":"string"},"type":"array"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"properties":{"Branch":{"items":{"$ref":"#/definitions/advisory.MBranch"},"type":"array"},"FullProductName":{"items":{"$ref":"#/definitions/advisory.MFullProductName"},"type":"array"}},"type":"object"},"advisory.MProviderMetadata":{"properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"properties":{"AffectedFiles":{"items":{"$ref":"#/definitions/advisory.AffectedFile"},"type":"array"},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/definitions/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array"},"RestartRequired":{"$ref":"#/definitions/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"properties":{"DocumentTitle":{"$ref":"#/definitions/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/definitions/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/definitions/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/definitions/advisory.RNote"},"type":"array"},"documentpublisher":{"$ref":"#/definitions/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/definitions/advisory.MVulnerability"},"type":"array"}},"type":"object"},"advisory.MSDocumentTitle":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"properties":{"ProductStatuses":{"items":{"$ref":"#/definitions/advisory.MProductStatus"},"type":"array"},"Remediations":{"items":{"$ref":"#/definitions/advisory.MRemediation"},"type":"array"},"Threats":{"items":{"$ref":"#/definitions/advisory.RThreat"},"type":"array"},"acknowledgments":{"items":{"$ref":"#/definitions/advisory.Acknowledgement"},"type":"array"},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/definitions/advisory.RScoreSet"},"type":"array"},"notes":{"items":{"$ref":"#/definitions/advisory.Note"},"type":"array"},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/definitions/advisory.RRevision"},"type":"array"},"title":{"$ref":"#/definitions/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/definitions/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/definitions/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/definitions/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/definitions/advisory.MEProduct"},"type":"array"},"Product_specific_details":{"items":{"$ref":"#/definitions/advisory.ProductSpecificDetail"},"type":"array"},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/definitions/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/definitions/advisory.McAfeeScore"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array"},"affected_software":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"properties":{"advisory":{"$ref":"#/definitions/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.OvalReference"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"properties":{"cvssV2_0":{"$ref":"#/definitions/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/definitions/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/definitions/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/definitions/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/definitions/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/definitions/advisory.MetricScenario"},"type":"array"}},"type":"object"},"advisory.MetricScenario":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvrf":{"$ref":"#/definitions/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/definitions/advisory.ITW"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"allOf":[{"$ref":"#/definitions/advisory.MicrosoftFileMetadata"}],"description":"File-level metadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/definitions/advisory.Kb"},"type":"array"},"threat":{"$ref":"#/definitions/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array"},"cfr-target-category":{"items":{"type":"string"},"type":"array"},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array"},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array"},"synonyms":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.MispRelatedItem":{"properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/definitions/advisory.MispMeta"},"related":{"items":{"$ref":"#/definitions/advisory.MispRelatedItem"},"type":"array"},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/definitions/advisory.NISTControl"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.MitreAttackRef"},"type":"array"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array"},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"properties":{"containers":{"$ref":"#/definitions/advisory.MContainers"},"cveMetadata":{"$ref":"#/definitions/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.ExternalReferences"},"type":"array"}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"properties":{"affected_components":{"items":{"$ref":"#/definitions/advisory.MozillaComponent"},"type":"array"},"bugzilla":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array"},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"properties":{"bugzilla":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"properties":{"cis_controls":{"items":{"$ref":"#/definitions/advisory.CISControl"},"type":"array"},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/definitions/advisory.NVD20Node"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.NVD20CVECPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/definitions/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array"},"v3AcceptanceLevel":{"$ref":"#/definitions/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"properties":{"cpe":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array"},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.NodeAuthor":{"properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"properties":{"affected_environments":{"items":{"type":"string"},"type":"array"},"author":{"$ref":"#/definitions/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.CurlAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.CurlCredit"},"type":"array"},"database_specific":{"$ref":"#/definitions/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/definitions/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/definitions/advisory.Affected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.OSVReference"},"type":"array"},"related":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"properties":{"affected_platforms":{"items":{"type":"string"},"type":"array"},"affected_services":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/definitions/advisory.OpenJDKCVE"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.OpenSSLVulnerability"},"type":"array"}},"type":"object"},"advisory.OpenSSLVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"$ref":"#/definitions/advisory.FixAff"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"properties":{"affects":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.GHSAAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"database_specific":{"$ref":"#/definitions/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GHSAReference"},"type":"array"},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/definitions/advisory.GHSASeverity"},"type":"array"},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"properties":{"_annotation":{"$ref":"#/definitions/advisory.OverrideAnnotation"},"cve":{"$ref":"#/definitions/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/definitions/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"properties":{"configurations":{"items":{"$ref":"#/definitions/advisory.OverrideConfiguration"},"type":"array"}},"type":"object"},"advisory.OverrideConfiguration":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.CPENode"},"type":"array"}},"type":"object"},"advisory.OwnCloud":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.PostgresSQL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/definitions/advisory.PGFix"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/definitions/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.ProductBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/definitions/advisory.Product"},"relationships":{"items":{"$ref":"#/definitions/advisory.CSAFRelationship"},"type":"array"}},"type":"object"},"advisory.ProductSpecificDetail":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductTree":{"properties":{"relationships":{"items":{"$ref":"#/definitions/advisory.Relationship"},"type":"array"}},"type":"object"},"advisory.ProductsAffected":{"properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/definitions/advisory.PyPAAffected"},"type":"array"},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/definitions/advisory.PyPAReference"},"type":"array"},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"properties":{"package":{"$ref":"#/definitions/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.PyPARange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.PyPAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.PyPAEvent"},"type":"array"},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"properties":{"chipsets":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v2":{"items":{"$ref":"#/definitions/advisory.CvsssV2_3"},"type":"array"},"cvss_v3":{"items":{"$ref":"#/definitions/advisory.CvsssV2_3"},"type":"array"},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/definitions/advisory.Patch"},"type":"array"},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/definitions/advisory.VendorRef"},"type":"array"}},"type":"object"},"advisory.RDescription":{"properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"properties":{"date":{"type":"string"},"description":{"$ref":"#/definitions/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/definitions/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array"},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.Event"},"type":"array"},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"}},"type":"object"},"advisory.RecordType":{"properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"properties":{"advisories":{"items":{"type":"string"},"type":"array"},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array"},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array"},"affected_release":{"items":{"$ref":"#/definitions/advisory.AffectedRel"},"type":"array"},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/definitions/advisory.PackageStat"},"type":"array"},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Relationship":{"properties":{"productReference":{"type":"string"},"relatesToProductReference":{"type":"string"},"relationType":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array"},"group_ids":{"items":{"type":"string"},"type":"array"},"product_ids":{"items":{"type":"string"},"type":"array"},"restart_required":{"$ref":"#/definitions/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.Revision":{"properties":{"date":{"type":"string"},"description":{"type":"string"},"number":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/definitions/advisory.RocheCVE"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"properties":{"affected_products":{"items":{"$ref":"#/definitions/advisory.RockwellAffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"properties":{"affectedProducts":{"items":{"type":"string"},"type":"array"},"buildReferences":{"items":{"type":"string"},"type":"array"},"cves":{"items":{"$ref":"#/definitions/advisory.RockyCve"},"type":"array"},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/definitions/advisory.RockyFix"},"type":"array"},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array"},"rpms":{"$ref":"#/definitions/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"properties":{"advisory":{"$ref":"#/definitions/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.RockyPackage"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/definitions/advisory.RockyVersion"},"type":"object"},"advisory.RockyVersion":{"properties":{"nvras":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Rsync":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"properties":{"advisory":{"$ref":"#/definitions/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/definitions/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/definitions/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"properties":{"arch":{"items":{"type":"string"},"type":"array"},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array"},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array"},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array"},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array"},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array"},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"properties":{"patched":{"items":{"type":"string"},"type":"array"},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SAAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"properties":{"document":{"$ref":"#/definitions/advisory.SiemensDocument"},"product_tree":{"$ref":"#/definitions/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.SiemensVulnerability"},"type":"array"}},"type":"object"},"advisory.SSDAdvisory":{"properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Safran":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Sandisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/definitions/advisory.SchneiderCVE"},"type":"array"},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ScoreSet":{"properties":{"baseScore":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.SecFix":{"properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvedetails":{"items":{"$ref":"#/definitions/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/definitions/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/definitions/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/definitions/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array"},"cnvd":{"items":{"type":"string"},"type":"array"},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"properties":{"names":{"items":{"type":"string"},"type":"array"},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"ssa":{"$ref":"#/definitions/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensSubBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"properties":{"text":{"type":"string"},"tlp":{"$ref":"#/definitions/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"properties":{"acknowledgments":{"items":{"$ref":"#/definitions/advisory.SiemensAcknowledgments"},"type":"array"},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/definitions/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/definitions/advisory.SiemensNotes"},"type":"array"},"publisher":{"$ref":"#/definitions/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/definitions/advisory.SiemensReferences"},"type":"array"},"title":{"type":"string"},"tracking":{"$ref":"#/definitions/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"properties":{"engine":{"$ref":"#/definitions/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/definitions/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"properties":{"model_numbers":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensProductStatus":{"properties":{"known_affected":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensProductTree":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensBranch"},"type":"array"}},"type":"object"},"advisory.SiemensPublisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"properties":{"cvss_v3":{"$ref":"#/definitions/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensSubBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensSubSubBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/definitions/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/definitions/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/definitions/advisory.SiemensRevisionHistory"},"type":"array"},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/definitions/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/definitions/advisory.SiemensNotes"},"type":"array"},"product_status":{"$ref":"#/definitions/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/definitions/advisory.SiemensReferences"},"type":"array"},"remediations":{"items":{"$ref":"#/definitions/advisory.SiemensRemediation"},"type":"array"},"scores":{"items":{"$ref":"#/definitions/advisory.SiemensScore"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array"},"sigma_rule":{"$ref":"#/definitions/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":true,"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array"},"fields":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/definitions/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"related":{"items":{"$ref":"#/definitions/advisory.RelatedRule"},"type":"array"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/definitions/advisory.SplunkProduct"},"type":"array"},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Status":{"properties":{"productID":{"items":{"type":"string"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Threat":{"properties":{"severity":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/definitions/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/definitions/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/definitions/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"},"vendor_names_for_threat_actors":{"items":{"$ref":"#/definitions/advisory.VendorNameForThreatActor"},"type":"array"},"vendors_and_products_targeted":{"items":{"$ref":"#/definitions/advisory.VendorProduct"},"type":"array"}},"type":"object"},"advisory.ThreatData":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Tibco":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.ToolRef"},"type":"array"}},"type":"object"},"advisory.ToolRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/definitions/advisory.RevisionHistory"},"type":"array"},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"properties":{"references":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Trustwave":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array"},"products":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"properties":{"affected_packages":{"items":{"$ref":"#/definitions/advisory.AffectedUbuntuPackage"},"type":"array"},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array"},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array"},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/definitions/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.Package"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.Reference"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/definitions/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.V3AcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.VCVulnerableCPEs":{"properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.VDEAdvisory":{"properties":{"csaf_json":{"$ref":"#/definitions/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"properties":{"affecting":{"items":{"type":"string"},"type":"array"},"credit":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"properties":{"config":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/definitions/advisory.ReportedExploit"},"type":"array"},"vulncheck_xdb":{"items":{"$ref":"#/definitions/advisory.XDB"},"type":"array"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnerability":{"properties":{"cve":{"type":"string"},"cvssscoreSets":{"$ref":"#/definitions/advisory.ScoreSet"},"description":{"type":"string"},"packages":{"description":"vulncheck addition","items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"productStatuses":{"items":{"$ref":"#/definitions/advisory.Status"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.CVRFReference"},"type":"array"},"threats":{"items":{"$ref":"#/definitions/advisory.Threat"},"type":"array"}},"type":"object"},"advisory.VulnerableDebianPackage":{"properties":{"associated_cves":{"items":{"$ref":"#/definitions/advisory.DebianCVE"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"properties":{"containers":{"$ref":"#/definitions/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/definitions/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"properties":{"adp":{"items":{"$ref":"#/definitions/advisory.ADP"},"type":"array"},"cna":{"$ref":"#/definitions/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/definitions/advisory.VulnrichmentOption"},"type":"array"},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"properties":{"other":{"$ref":"#/definitions/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"properties":{"content":{"$ref":"#/definitions/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.WolfiPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.WolfiSecFix"},"type":"array"}},"type":"object"},"advisory.WolfiSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"properties":{"cves":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array"},"filter_ids_dv":{"items":{"type":"string"},"type":"array"},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/definitions/advisory.ZDIProduct"},"type":"array"},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/definitions/advisory.ZDIResponse"},"type":"array"},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/definitions/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/definitions/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/definitions/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/definitions/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"properties":{"cvssV3":{"$ref":"#/definitions/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/definitions/api.CPEName"},"type":"array"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"properties":{"CVE_data_meta":{"$ref":"#/definitions/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/definitions/api.Description"},"problemtype":{"$ref":"#/definitions/api.ProblemType"},"references":{"$ref":"#/definitions/api.References"}},"type":"object"},"api.CVEDataMeta":{"properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"properties":{"CVE_data_meta":{"$ref":"#/definitions/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/definitions/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/definitions/api.Description"},"problemtype":{"$ref":"#/definitions/api.ProblemTypeExtended"},"references":{"$ref":"#/definitions/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"properties":{"tags":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.ClientFingerprints":{"properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/definitions/api.Nodes"},"type":"array"}},"type":"object"},"api.CveItems":{"properties":{"configurations":{"$ref":"#/definitions/api.Configurations"},"cve":{"$ref":"#/definitions/api.CVE"},"impact":{"$ref":"#/definitions/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/definitions/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.CveItemsExtended":{"properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/definitions/api.Configurations"},"cve":{"$ref":"#/definitions/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/definitions/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/definitions/api.MitreAttackTech"},"type":"array"},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/definitions/api.RelatedAttackPattern"},"type":"array"},"vcConfigurations":{"$ref":"#/definitions/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vulnerable_cpes":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.DateTime":{"properties":{"date":{"type":"string"}},"type":"object"},"api.Description":{"properties":{"description_data":{"items":{"$ref":"#/definitions/api.DescriptionData"},"type":"array"}},"type":"object"},"api.DescriptionData":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"properties":{"cves":{"items":{"$ref":"#/definitions/api.ExploitChainCVE"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/definitions/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"allOf":[{"$ref":"#/definitions/api.EPSS"}],"description":"exclude EPSS from changelog"},"exploits":{"items":{"$ref":"#/definitions/api.NormalizedExploitV3Entry"},"type":"array"},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/definitions/api.NormalizedReportV3Entry"},"type":"array"},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/definitions/api.ExploitsV3Timeline"},"trending":{"$ref":"#/definitions/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"properties":{"changes":{"items":{"$ref":"#/definitions/api.ExploitsChange"},"type":"array"},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"properties":{"baseMetricV2":{"$ref":"#/definitions/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"metricV40":{"allOf":[{"$ref":"#/definitions/advisory.CVSSV40"}],"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics"}},"type":"object"},"api.ImpactExtended":{"properties":{"baseMetricV2":{"$ref":"#/definitions/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"epss":{"$ref":"#/definitions/api.EPSS"},"metricV40":{"$ref":"#/definitions/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/definitions/api.SSVC"},"type":"array"},"temporalMetricV2":{"$ref":"#/definitions/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/definitions/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/definitions/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/definitions/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/definitions/api.InitialAccessArtifact"},"type":"array"},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array"}},"type":"object"},"api.InitialAccessArtifact":{"properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array"},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array"},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array"},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array"},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array"},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array"},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array"},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array"},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array"},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array"},"fofaRawQueries":{"items":{"type":"string"},"type":"array"},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array"},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array"},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array"},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array"},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array"},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array"},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array"},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array"},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.MitreAttackTech":{"properties":{"d3fendmapping":{"items":{"$ref":"#/definitions/api.MitreMitigation2D3fendMapping"},"type":"array"},"detections":{"items":{"$ref":"#/definitions/api.MitreDetectionTech"},"type":"array"},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/definitions/api.MitreMitigationTech"},"type":"array"},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"properties":{"cve_list":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"technique_id":{"$ref":"#/definitions/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"properties":{"d3fendtechniques":{"items":{"$ref":"#/definitions/api.MitreD3fendTechnique"},"type":"array"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/definitions/api.NVD20CPEName"},"type":"array"},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"descriptions":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/definitions/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/api.NVD20Reference"},"type":"array"},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vendorComments":{"items":{"$ref":"#/definitions/api.NVD20VendorComment"},"type":"array"},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/definitions/api.NVD20Weakness"},"type":"array"}},"type":"object"},"api.NVD20CVEExtended":{"properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/definitions/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/definitions/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/definitions/api.MitreAttackTech"},"type":"array"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/api.NVD20ReferenceExtended"},"type":"array"},"relatedAttackPatterns":{"items":{"$ref":"#/definitions/api.RelatedAttackPattern"},"type":"array"},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vendorComments":{"items":{"$ref":"#/definitions/api.NVD20VendorComment"},"type":"array"},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array"},"weaknesses":{"items":{"$ref":"#/definitions/api.NVD20WeaknessExtended"},"type":"array"}},"type":"object"},"api.NVD20CvssDataV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/definitions/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"properties":{"cvssData":{"$ref":"#/definitions/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"properties":{"cvssData":{"$ref":"#/definitions/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV2"},"type":"array"},"cvssMetricV30":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV31":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV40":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV40"},"type":"array"}},"type":"object"},"api.NVD20MetricExtended":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV2"},"type":"array"},"cvssMetricV30":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV31":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV40":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV40"},"type":"array"},"epss":{"$ref":"#/definitions/api.EPSS"},"ssvc":{"items":{"$ref":"#/definitions/api.SSVC"},"type":"array"},"temporalCVSSV2":{"$ref":"#/definitions/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV2"},"type":"array"},"temporalCVSSV30":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"type":"array"},"temporalCVSSV31":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"type":"array"},"threatCVSSV40":{"$ref":"#/definitions/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/definitions/api.NVD20ThreatCVSSV40"},"type":"array"}},"type":"object"},"api.NVD20Reference":{"properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"properties":{"associatedBaseMetricV2":{"$ref":"#/definitions/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"properties":{"associatedBaseMetricV3":{"$ref":"#/definitions/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"properties":{"associatedBaseMetricV40":{"$ref":"#/definitions/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"properties":{"description":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"properties":{"description":{"items":{"$ref":"#/definitions/api.NVD20WeaknessDescExtended"},"type":"array"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"properties":{"children":{"items":{"$ref":"#/definitions/api.Nodes"},"type":"array"},"cpe_match":{"items":{"$ref":"#/definitions/api.CPEMatch"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"properties":{"artifacts":{"$ref":"#/definitions/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array"},"licenses":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array"},"research_attributes":{"$ref":"#/definitions/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"api.OSSPackageArtifacts":{"properties":{"binary":{"items":{"$ref":"#/definitions/api.OSSPackageDownloadInfo"},"type":"array"},"source":{"items":{"$ref":"#/definitions/api.OSSPackageDownloadInfo"},"type":"array"}},"type":"object"},"api.OSSPackageDownloadInfo":{"properties":{"hashes":{"items":{"$ref":"#/definitions/api.OSSPackageHashInfo"},"type":"array"},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"properties":{"problemtype_data":{"items":{"$ref":"#/definitions/api.ProblemTypeData"},"type":"array"}},"type":"object"},"api.ProblemTypeData":{"properties":{"description":{"items":{"$ref":"#/definitions/api.ProblemTypeDescription"},"type":"array"}},"type":"object"},"api.ProblemTypeDataExtended":{"properties":{"description":{"items":{"$ref":"#/definitions/api.ProblemTypeDescriptionExtended"},"type":"array"}},"type":"object"},"api.ProblemTypeDescription":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"properties":{"problemtype_data":{"items":{"$ref":"#/definitions/api.ProblemTypeDataExtended"},"type":"array"}},"type":"object"},"api.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.References":{"properties":{"reference_data":{"items":{"$ref":"#/definitions/api.ReferenceData"},"type":"array"}},"type":"object"},"api.ReferencesExtended":{"properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/definitions/api.ReferenceDataExtended"},"type":"array"}},"type":"object"},"api.RelatedAttackPattern":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"properties":{"cvssV2":{"$ref":"#/definitions/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"properties":{"cvssV3":{"$ref":"#/definitions/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/definitions/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/api.Package"},"type":"array"},"references":{"items":{"$ref":"#/definitions/api.Reference"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/definitions/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/definitions/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/definitions/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"models.Entitlements":{"properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/definitions/paginate.Match"},"type":"array"},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array"},"parameters":{"items":{"$ref":"#/definitions/paginate.Param"},"type":"array"},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array"}},"type":"object"},"paginate.Param":{"properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array"},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"allOf":[{"$ref":"#/definitions/purl.PackageURLJSON"}],"description":"meta-data about the purl"},"research_attributes":{"$ref":"#/definitions/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"purl.PackageURLJSON":{"properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/definitions/purl.QualifierJSON"},"type":"array"},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"type":"object"},"purls.PurlResponse":{"properties":{"artifacts":{"$ref":"#/definitions/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array"},"licenses":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/purls.Vulnerability"},"type":"array"}},"type":"object"},"purls.Vulnerability":{"properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/definitions/params.IndexBackupList"},"type":"array"}},"type":"object"},"render.Response-array_params_IndexList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/definitions/params.IndexList"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.A10"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ABBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AIX"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AMD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AMI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ASRG"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AVEVAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AVIDMLAdvs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AWS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Abbott"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Absolute"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Acronis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AdobeAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Advantech"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Advisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AdvisoryRecord"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlephResearch"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Alibaba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlmaLinuxUpdate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AmazonCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AnchoreNVDOverride"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AndroidAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheActiveMQ"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheArchiva"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheArrow"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCamel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCommons"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCouchDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheFlink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheGuacamole"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheHTTP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheHadoop"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheJSPWiki"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheKafka"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheLoggingServices"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheNiFi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOFBiz"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOpenMeetings"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOpenOffice"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApachePulsar"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheShiro"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSpark"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheStruts"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSubversion"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSuperset"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheTomcat"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheZooKeeper"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AppCheck"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Appgate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AppleAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ArchIssue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Arista"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Aruba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AssetNote"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Asterisk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Astra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Asus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AtlassianAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AtlassianVuln"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Atredis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Audiocodes"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AusCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Autodesk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Avaya"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Avigilon"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Axis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Azul"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BBraunAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BDUAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Bandr"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BaxterAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeckhoffAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeckmanCoulter"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BectonDickinsonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeldenAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeyondTrust"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Binarly"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BitDefender"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BlackBerry"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BoschAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BostonScientificAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Botnet"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CACyberCentreAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CBLMariner"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CERTEUAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CESA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CISAAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNNVDEntryJSON"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNVDBulletin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNVDFlaw"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CanvasExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CarestreamAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Carrier"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertBE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertFRAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertIN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertIRSecurityAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertSE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertUA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ChainGuard"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CheckPoint"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Chrome"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ciena"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CisaCsafAdv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoKnownGoodValue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CitrixAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ClarotyVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CloudBees"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CloudVulnDBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CodesysAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CommVault"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CompassSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ContainerOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CoreImpactExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Crestron"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CrowdSec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Curl"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Cvrf"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DFNCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DNN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dahua"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Danfoss"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dassault"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DebianSecurityAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DeltaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DistroPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Django"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DotCMS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DragosAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Draytek"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Drupal"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLAlibaba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLMicrosoft"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLReleaseData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EUVD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EatonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Elastic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Elspec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EmergingThreatsSnort"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EmersonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EndOfLife"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Endress"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ExodusIntel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ExploitDBExploitv2"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.F5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FSecure"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fanuc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fastly"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Festo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FileCloud"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FileZilla"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FlattSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ForgeRock"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FortinetAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FortinetIPS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Foxit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fresenius"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GCP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GEGas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GEHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GHAdvisoryJSONLean"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GHSA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GMOCyberSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gallagher"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gen"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Genetec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gigabyte"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitHubExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitLabExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GiteeExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitlabAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Glibc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GnuTLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GoVulnJSON"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Grafana"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GreyNoiseDetection"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HCL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HIKVision"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HKCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HPE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Hacktivity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HarmonyOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HashiCorp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HaskellSADBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HillromAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Hitachi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HitachiEnergy"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Honeywell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Huawei"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HuaweiEulerOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HuaweiIPS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IAVA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IBM"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ITWExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Idemia"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Igel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IncibeAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Intel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IpIntelRecord"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IsraeliAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IsraeliVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Istio"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ivanti"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IvantiRSS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JFrog"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JNJAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JVN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JVNAdvisoryItem"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Jenkins"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JetBrains"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JohnsonControls"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Juniper"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.K8S"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KEVCatalogVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KRCertAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KasperskyICSCERTAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KoreLogic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Kunbus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LG"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Lantronix"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Lenovo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LexmarkAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LibreOffice"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Linux"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LolAdvs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MACert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MFiles"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MaliciousPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ManageEngineAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MbedTLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.McAfee"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mediatek"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MedtronicAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mendix"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetaData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetasploitExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftCVRF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftDriverBlockList"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftKb"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mikrotik"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mindray"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MispValue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mitel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MitreCVEListV5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MitsubishiElectricAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MongoDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MoxaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MozillaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NCSC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NCSCCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NEC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NHS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NTP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NVD20Source"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NVDCPEDictionary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NZAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Naver"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nessus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NetApp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netatalk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netgate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netgear"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netskope"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nexpose"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NginxAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NodeJS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NodeSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nokia"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NotePadPlusPlus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nozomi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nuclei"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OSV"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OTRS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OctopusDeploy"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Okta"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Omron"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OneE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenBSD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenCVDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenJDK"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenSSH"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenSSLSecAdv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenStack"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Opengear"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OracleCPU"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OracleCPUCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OwnCloud"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PHPMyAdmin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PKCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PTC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PacketstormExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Palantir"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PaloAltoAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Panasonic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PaperCut"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Pega"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PhilipsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PhoenixContactAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PostgresSQL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PowerDNS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Progress"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Proofpoint"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PureStorage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PyPAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QNAPAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QQID"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QSB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Qualcomm"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Qualys"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QualysQID"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RansomwareExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RedhatCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Renesas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Revive"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RhelCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Roche"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Rockwell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RockyErrata"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Rsync"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ruckus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RustsecAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SAP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SECConsult"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SSDAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Safran"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SaintExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SalesForce"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Samba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sandisk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SansDshield"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SchneiderElectricAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Schutzwerk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SecurityBulletin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SecurityLab"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SeebugExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SentinelOne"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ServiceNow"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SevenZip"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ShadowServerExploitedVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Shielder"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sick"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SiemensAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SierraWireless"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SigmaRule"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SingCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sitecore"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Slackware"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SolarWindsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Solr"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sonatype"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SonicWallAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SpacelabsHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Splunk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Spring"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Stormshield"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.StrykerAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sudo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SuseSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SwisslogHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Symfony"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Synacktiv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SyncroSoft"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Synology"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Syss"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TPLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TWCertAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tailscale"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TalosAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TeamViewer"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TenableResearchAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tencent"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Thales"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TheMissingLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ThermoFisher"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ThreatActorWithExternalObjects"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tibco"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TraneTechnology"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TrendMicro"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Trustwave"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.USD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.USOMAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ubiquiti"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.UbuntuCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Unify"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Unisoc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Update"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VCCPEDictionary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VCVulnerableCPEs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VDEAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VLC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VMWareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VYAIREAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VanDyke"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VapidLabsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Veeam"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Veritas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Virtuozzo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VoidSec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheck"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckCVEListV5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckConfig"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckKEV"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnerableDebianPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Vulnrichment"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WRT"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WatchGuard"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WhatsApp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wibu"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wireshark"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WithSecure"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WolfSSL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wolfi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wordfence"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xen"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xerox"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xiaomi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xylem"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Yamaha"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.YokogawaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Yubico"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zebra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ZeroDayAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ZeroScienceAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zimbra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zoom"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zscaler"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zuso"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zyxel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CWE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CveItems"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CveItemsExtended"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.EPSSData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitChain"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitV3Result"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitsChangelog"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.InitialAccess"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.MitreAttackToCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CPEMatch"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CVEExtended"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.OSSPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.Update"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.VulnCheckCanary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.VulnerabilityAlias"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/purls.PurlResponse"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/definitions/params.IndexBackup"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/definitions/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/definitions/purl.BatchVulnFinding"},"type":"array"}},"type":"object"},"v3controllers.BackupResponseMetadata":{"properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"v3controllers.PurlResponseMetadata":{"properties":{"purl_struct":{"allOf":[{"$ref":"#/definitions/purl.PackageURLJSON"}],"description":"meta-data about the purl"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/definitions/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"Version 3 of the VulnCheck API","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"3.0"},"paths":{"/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.Response-array_params_IndexBackupList"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","honeywell","hp","hpe","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","metasploit","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"in":"path","name":"index","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"type":"string"},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/entitlements":{"get":{"description":"Retrieve entitlements for the current user","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/models.Entitlements"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.Response-array_params_IndexList"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"additionalProperties":true,"type":"object"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","enum":["txt","json","text"],"in":"query","name":"format","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","parameters":[{"description":"PURL strings used to identify and locate software packages","in":"body","name":"purls","required":true,"schema":{"items":{"type":"string"},"type":"array"}}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","parameters":[{"description":"Type of ruleset to retrieve","enum":["snort","suricata"],"in":"path","name":"type","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","enum":["txt","json","text"],"in":"query","name":"format","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}}},"securityDefinitions":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}},"swagger":"2.0"} \ No newline at end of file +{"basePath":"/v3","definitions":{"advisory.A10":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"reference":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array"},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"metrics":{"items":{"$ref":"#/definitions/advisory.VulnrichmentMetric"},"type":"array"},"providerMetadata":{"$ref":"#/definitions/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"},"impacts":{"description":"OK","items":{"$ref":"#/definitions/advisory.Impact"},"type":"array"},"metrics":{"description":"OK","items":{"$ref":"#/definitions/advisory.Metric"},"type":"array"},"problemTypes":{"description":"OK","items":{"$ref":"#/definitions/advisory.MProblemTypes"},"type":"array"},"providerMetadata":{"allOf":[{"$ref":"#/definitions/advisory.MProviderMetadata"}],"description":"OK"},"references":{"items":{"$ref":"#/definitions/advisory.MReference"},"type":"array"},"tags":{"description":"OK","items":{"type":"string"},"type":"array"},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"properties":{"name":{"items":{"$ref":"#/definitions/advisory.IVal"},"type":"array"},"url":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Acronis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"properties":{"adobe_cves":{"items":{"$ref":"#/definitions/advisory.AdobeCVE"},"type":"array"},"affected":{"items":{"$ref":"#/definitions/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/definitions/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/definitions/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"properties":{"bugzilla":{"$ref":"#/definitions/advisory.Bugzilla"},"cve":{"$ref":"#/definitions/advisory.OvalCVE"},"issued":{"$ref":"#/definitions/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/definitions/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array"},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/definitions/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.Range"},"type":"array"},"severity":{"items":{"$ref":"#/definitions/advisory.Severity"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AffectedChrome":{"properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/definitions/advisory.AffectedDebianRepository"},"type":"array"},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"properties":{"break_commit_url":{"items":{"type":"string"},"type":"array"},"fix_commit_url":{"items":{"type":"string"},"type":"array"},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/definitions/advisory.UbuntuPackageReleaseStatus"},"type":"array"},"upstream_fix_url":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AlephResearch":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"properties":{"cnnvd":{"items":{"type":"string"},"type":"array"},"cnvd":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"properties":{"bs_repo_id":{"$ref":"#/definitions/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/definitions/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/definitions/advisory.AlmaDate"},"pkglist":{"$ref":"#/definitions/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.AlmaReference"},"type":"array"},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/definitions/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.AlmaPackage"},"type":"array"},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecDBPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecurityFix"},"type":"array"}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AmazonAffectedPackage"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"override":{"$ref":"#/definitions/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AndroidAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.AndroidReference"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"properties":{"ecosystem_specific":{"$ref":"#/definitions/advisory.EcoSystem"},"package":{"$ref":"#/definitions/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.AndroidRange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AndroidEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.AndroidEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.ApacheSubversion":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"properties":{"components":{"items":{"$ref":"#/definitions/advisory.AppleComponent"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"properties":{"bdu":{"items":{"type":"string"},"type":"array"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"properties":{"affected_version":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/definitions/advisory.AtlassianProducts"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Audiocodes":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/definitions/advisory.PrimeVersion"},"type":"array"},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/definitions/advisory.ZuluVersion"},"type":"array"}},"type":"object"},"advisory.BBraunAdvisory":{"properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.BDUAdvisory":{"properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array"},"cvss":{"$ref":"#/definitions/advisory.BDUCvss"},"cvss3":{"$ref":"#/definitions/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/definitions/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array"},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/definitions/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"properties":{"vector":{"$ref":"#/definitions/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"properties":{"vector":{"$ref":"#/definitions/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"properties":{"os":{"$ref":"#/definitions/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/definitions/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"properties":{"soft":{"$ref":"#/definitions/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.BeckmanCoulter":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/definitions/advisory.ProductsAffected"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"}},"type":"object"},"advisory.Bugzilla":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"properties":{"affectedProducts":{"type":"string"},"alertID":{"type":"string"},"archived":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"cveexploitedITW":{"type":"boolean"},"cvss":{"type":"string"},"date_added":{"type":"string"},"icsa":{"type":"boolean"},"icsma":{"type":"boolean"},"mitigations":{"type":"string"},"releaseDate":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.CISControl":{"properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array"},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array"},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"properties":{"changed":{"items":{"type":"string"},"type":"array"},"featured":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array"},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.CPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"properties":{"document":{"allOf":[{"$ref":"#/definitions/advisory.DocumentMetadata"}],"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"product_tree":{"allOf":[{"$ref":"#/definitions/advisory.ProductBranch"}],"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/definitions/advisory.CSAFVulnerability"},"type":"array"}},"type":"object"},"advisory.CSAFDistribution":{"type":"object"},"advisory.CSAFNote":{"properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/definitions/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"properties":{"cvss_v2":{"$ref":"#/definitions/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/definitions/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CSAFVulnerability":{"properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/definitions/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/definitions/advisory.Flag"},"type":"array"},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/definitions/advisory.TrackingID"},"type":"array"},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/definitions/advisory.CSAFReference"},"type":"array"},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/definitions/advisory.RemediationData"},"type":"array"},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/definitions/advisory.CSAFScore"},"type":"array"},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/definitions/advisory.ThreatData"},"type":"array"}},"type":"object"},"advisory.CVEDetail":{"properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVRFReference":{"properties":{"description":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"properties":{"cweid":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CanvasExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"properties":{"affected_software":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CertFRAdvisory":{"properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.ChainGuardPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.ChainGuardSecFix"},"type":"array"}},"type":"object"},"advisory.ChainGuardSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AffectedChrome"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"properties":{"cves":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/definitions/advisory.VulnerableProduct"},"type":"array"}},"type":"object"},"advisory.CisaCsafAdv":{"properties":{"csaf_json":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array"},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cve_details":{"items":{"$ref":"#/definitions/advisory.CommVaultCVEDetails"},"type":"array"},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/definitions/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array"},"resolution":{"$ref":"#/definitions/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CommVaultImpactedProduct":{"properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/definitions/advisory.CommVaultImpactedProductDetails"},"type":"array"}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array"},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/definitions/advisory.CommVaultResolutionDetails"},"type":"array"}},"type":"object"},"advisory.CommVaultResolutionDetails":{"properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/definitions/advisory.COSUpdate"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"info":{"$ref":"#/definitions/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"properties":{"ranges":{"items":{"$ref":"#/definitions/advisory.CurlRange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CurlCWE":{"properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array"},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"notes":{"items":{"$ref":"#/definitions/advisory.DocumentNote"},"type":"array"},"productTree":{"$ref":"#/definitions/advisory.ProductTree"},"references":{"items":{"$ref":"#/definitions/advisory.CVRFReference"},"type":"array"},"title":{"type":"string"},"tracking":{"$ref":"#/definitions/advisory.DocumentTracking"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.Vulnerability"},"type":"array"}},"type":"object"},"advisory.CvsssV2_3":{"properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.CWENode"},"type":"array"},"totalCount":{"type":"integer"}},"type":"object"},"advisory.Cycle":{"properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"properties":{"CWE":{"$ref":"#/definitions/advisory.CurlCWE"},"award":{"$ref":"#/definitions/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_details":{"items":{"$ref":"#/definitions/advisory.DanFossCVEDetails"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.DebianCVE":{"properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/definitions/advisory.AffectedDebianRelease"},"type":"array"},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"properties":{"affected_packages":{"items":{"$ref":"#/definitions/advisory.AffectedDebianPackage"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/definitions/advisory.DellCVE"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"license":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/definitions/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/definitions/advisory.DistroVersion"},"type":"array"}},"type":"object"},"advisory.DistroVersion":{"properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/definitions/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"publisher":{"$ref":"#/definitions/advisory.Publisher"},"references":{"items":{"$ref":"#/definitions/advisory.CSAFReference"},"type":"array"},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/definitions/advisory.Tracking"}},"type":"object"},"advisory.DocumentNote":{"properties":{"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.DocumentPublisher":{"properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DocumentTracking":{"properties":{"currentReleaseDate":{"type":"string"},"id":{"type":"string"},"initialReleaseDate":{"type":"string"},"revisionHistory":{"items":{"$ref":"#/definitions/advisory.Revision"},"type":"array"},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.DotCMS":{"properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Draytek":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array"},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/definitions/advisory.EnisaIDProduct"},"type":"array"},"enisa_id_vendor":{"items":{"$ref":"#/definitions/advisory.EnisaIDVendor"},"type":"array"},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cycles":{"items":{"$ref":"#/definitions/advisory.Cycle"},"type":"array"},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array"},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.FlattSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.FoxitAffected"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"$ref":"#/definitions/advisory.GHCvss"},"cwes":{"$ref":"#/definitions/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/definitions/advisory.GHIdentifier"},"type":"array"},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GHReference"},"type":"array"},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/definitions/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"properties":{"package":{"$ref":"#/definitions/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"ghsa":{"$ref":"#/definitions/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"properties":{"ecosystem_specific":{"$ref":"#/definitions/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/definitions/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.GHSARange"},"type":"array"}},"type":"object"},"advisory.GHSADatabaseSpecific":{"properties":{"cwe_ids":{"items":{"type":"string"},"type":"array"},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"properties":{"affected_functions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.GHSAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.GHSAEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.GHNode"},"type":"array"},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Genetec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array"},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array"},"ghsa":{"items":{"type":"string"},"type":"array"},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array"},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array"},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"properties":{"database_specific":{"$ref":"#/definitions/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/definitions/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/definitions/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.GoVulnRanges"},"type":"array"}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"properties":{"imports":{"items":{"$ref":"#/definitions/advisory.GoVulnImport"},"type":"array"}},"type":"object"},"advisory.GoVulnImport":{"properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.GoVulnJSON":{"properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/definitions/advisory.GoVulnAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.GoCredits"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array"},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GoVulnReference"},"type":"array"}},"type":"object"},"advisory.GoVulnPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.GoEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array"},"related_tags":{"items":{"$ref":"#/definitions/advisory.GreyNoiseTags"},"type":"array"},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HMS":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/definitions/advisory.HaskellVersion"},"type":"array"},"arch":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array"},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/definitions/advisory.HaskellAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"integer"},"type":"array"},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array"},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.HaskellVersion":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.IBM":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":true,"type":"object"},"advisory.Igel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"}},"type":"object"},"advisory.IncibeAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"feed_ids":{"items":{"type":"string"},"type":"array"},"hostnames":{"items":{"type":"string"},"type":"array"},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array"},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/definitions/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.Istio":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"properties":{"cpes":{"items":{"$ref":"#/definitions/advisory.NVD20CVECPEMatch"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.JNJAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"properties":{"cpe":{"items":{"$ref":"#/definitions/advisory.JVNCPE"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"items":{"$ref":"#/definitions/advisory.CVSS"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.JVNReference"},"type":"array"},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array"},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.KoreLogic":{"properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array"},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"properties":{"affectedProducts":{"items":{"$ref":"#/definitions/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array"},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array"},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/definitions/advisory.MVersion"},"type":"array"}},"type":"object"},"advisory.MBranch":{"properties":{"Branch":{"items":{"$ref":"#/definitions/advisory.MBranch"},"type":"array"},"FullProductName":{"items":{"$ref":"#/definitions/advisory.MFullProductName"},"type":"array"},"Items":{"items":{"$ref":"#/definitions/advisory.MItem"},"type":"array"},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/definitions/advisory.MNodes"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"cpeApplicability":{"items":{"$ref":"#/definitions/advisory.MCPEApplicability"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.Credit"},"type":"array"},"descriptions":{"items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"},"impacts":{"items":{"$ref":"#/definitions/advisory.Impact"},"type":"array"},"metrics":{"items":{"$ref":"#/definitions/advisory.Metric"},"type":"array"},"problemTypes":{"items":{"$ref":"#/definitions/advisory.MProblemTypes"},"type":"array"},"providerMetadata":{"$ref":"#/definitions/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/definitions/advisory.MReference"},"type":"array"},"tags":{"items":{"type":"string"},"type":"array"},"timeline":{"items":{"$ref":"#/definitions/advisory.Timeline"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"properties":{"adp":{"items":{"$ref":"#/definitions/advisory.ADPContainer"},"type":"array"},"cna":{"$ref":"#/definitions/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/definitions/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/definitions/advisory.RRevision"},"type":"array"},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/definitions/advisory.MispMeta"},"related":{"items":{"$ref":"#/definitions/advisory.MispRelatedItem"},"type":"array"},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechnique"},"type":"array"}},"type":"object"},"advisory.MIdentification":{"properties":{"alias":{"$ref":"#/definitions/advisory.IVal"},"id":{"$ref":"#/definitions/advisory.IVal"}},"type":"object"},"advisory.MItem":{"properties":{"Items":{"items":{"$ref":"#/definitions/advisory.MItem"},"type":"array"},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.MCPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"properties":{"descriptions":{"items":{"$ref":"#/definitions/advisory.PTMDescriptions"},"type":"array"}},"type":"object"},"advisory.MProductStatus":{"properties":{"ProductID":{"items":{"type":"string"},"type":"array"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"properties":{"Branch":{"items":{"$ref":"#/definitions/advisory.MBranch"},"type":"array"},"FullProductName":{"items":{"$ref":"#/definitions/advisory.MFullProductName"},"type":"array"}},"type":"object"},"advisory.MProviderMetadata":{"properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"properties":{"AffectedFiles":{"items":{"$ref":"#/definitions/advisory.AffectedFile"},"type":"array"},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/definitions/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array"},"RestartRequired":{"$ref":"#/definitions/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"properties":{"DocumentTitle":{"$ref":"#/definitions/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/definitions/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/definitions/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/definitions/advisory.RNote"},"type":"array"},"documentpublisher":{"$ref":"#/definitions/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/definitions/advisory.MVulnerability"},"type":"array"}},"type":"object"},"advisory.MSDocumentTitle":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"properties":{"ProductStatuses":{"items":{"$ref":"#/definitions/advisory.MProductStatus"},"type":"array"},"Remediations":{"items":{"$ref":"#/definitions/advisory.MRemediation"},"type":"array"},"Threats":{"items":{"$ref":"#/definitions/advisory.RThreat"},"type":"array"},"acknowledgments":{"items":{"$ref":"#/definitions/advisory.Acknowledgement"},"type":"array"},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/definitions/advisory.RScoreSet"},"type":"array"},"notes":{"items":{"$ref":"#/definitions/advisory.Note"},"type":"array"},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/definitions/advisory.RRevision"},"type":"array"},"title":{"$ref":"#/definitions/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/definitions/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/definitions/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/definitions/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/definitions/advisory.MEProduct"},"type":"array"},"Product_specific_details":{"items":{"$ref":"#/definitions/advisory.ProductSpecificDetail"},"type":"array"},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/definitions/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/definitions/advisory.McAfeeScore"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array"},"affected_software":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"properties":{"advisory":{"$ref":"#/definitions/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.OvalReference"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"properties":{"cvssV2_0":{"$ref":"#/definitions/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/definitions/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/definitions/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/definitions/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/definitions/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/definitions/advisory.MetricScenario"},"type":"array"}},"type":"object"},"advisory.MetricScenario":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvrf":{"$ref":"#/definitions/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/definitions/advisory.ITW"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"allOf":[{"$ref":"#/definitions/advisory.MicrosoftFileMetadata"}],"description":"File-level metadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/definitions/advisory.Kb"},"type":"array"},"threat":{"$ref":"#/definitions/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array"},"cfr-target-category":{"items":{"type":"string"},"type":"array"},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array"},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array"},"synonyms":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.MispRelatedItem":{"properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/definitions/advisory.MispMeta"},"related":{"items":{"$ref":"#/definitions/advisory.MispRelatedItem"},"type":"array"},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/definitions/advisory.NISTControl"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.MitreAttackRef"},"type":"array"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array"},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"properties":{"containers":{"$ref":"#/definitions/advisory.MContainers"},"cveMetadata":{"$ref":"#/definitions/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.ExternalReferences"},"type":"array"}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"properties":{"affected_components":{"items":{"$ref":"#/definitions/advisory.MozillaComponent"},"type":"array"},"bugzilla":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array"},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"properties":{"bugzilla":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"properties":{"cis_controls":{"items":{"$ref":"#/definitions/advisory.CISControl"},"type":"array"},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/definitions/advisory.NVD20Node"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.NVD20CVECPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/definitions/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array"},"v3AcceptanceLevel":{"$ref":"#/definitions/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"properties":{"cpe":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array"},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.NodeAuthor":{"properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"properties":{"affected_environments":{"items":{"type":"string"},"type":"array"},"author":{"$ref":"#/definitions/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.CurlAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.CurlCredit"},"type":"array"},"database_specific":{"$ref":"#/definitions/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/definitions/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/definitions/advisory.Affected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.OSVReference"},"type":"array"},"related":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"properties":{"affected_platforms":{"items":{"type":"string"},"type":"array"},"affected_services":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/definitions/advisory.OpenJDKCVE"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.OpenSSLVulnerability"},"type":"array"}},"type":"object"},"advisory.OpenSSLVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"$ref":"#/definitions/advisory.FixAff"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"properties":{"affects":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.GHSAAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"database_specific":{"$ref":"#/definitions/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GHSAReference"},"type":"array"},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/definitions/advisory.GHSASeverity"},"type":"array"},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"properties":{"_annotation":{"$ref":"#/definitions/advisory.OverrideAnnotation"},"cve":{"$ref":"#/definitions/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/definitions/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"properties":{"configurations":{"items":{"$ref":"#/definitions/advisory.OverrideConfiguration"},"type":"array"}},"type":"object"},"advisory.OverrideConfiguration":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.CPENode"},"type":"array"}},"type":"object"},"advisory.OwnCloud":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.PostgresSQL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/definitions/advisory.PGFix"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/definitions/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.ProductBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/definitions/advisory.Product"},"relationships":{"items":{"$ref":"#/definitions/advisory.CSAFRelationship"},"type":"array"}},"type":"object"},"advisory.ProductSpecificDetail":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductTree":{"properties":{"relationships":{"items":{"$ref":"#/definitions/advisory.Relationship"},"type":"array"}},"type":"object"},"advisory.ProductsAffected":{"properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/definitions/advisory.PyPAAffected"},"type":"array"},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/definitions/advisory.PyPAReference"},"type":"array"},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"properties":{"package":{"$ref":"#/definitions/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.PyPARange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.PyPAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.PyPAEvent"},"type":"array"},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"properties":{"chipsets":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v2":{"items":{"$ref":"#/definitions/advisory.CvsssV2_3"},"type":"array"},"cvss_v3":{"items":{"$ref":"#/definitions/advisory.CvsssV2_3"},"type":"array"},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/definitions/advisory.Patch"},"type":"array"},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/definitions/advisory.VendorRef"},"type":"array"}},"type":"object"},"advisory.RDescription":{"properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"properties":{"date":{"type":"string"},"description":{"$ref":"#/definitions/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/definitions/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array"},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.Event"},"type":"array"},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"}},"type":"object"},"advisory.RecordType":{"properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedLion":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"properties":{"advisories":{"items":{"type":"string"},"type":"array"},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array"},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array"},"affected_release":{"items":{"$ref":"#/definitions/advisory.AffectedRel"},"type":"array"},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/definitions/advisory.PackageStat"},"type":"array"},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Relationship":{"properties":{"productReference":{"type":"string"},"relatesToProductReference":{"type":"string"},"relationType":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array"},"group_ids":{"items":{"type":"string"},"type":"array"},"product_ids":{"items":{"type":"string"},"type":"array"},"restart_required":{"$ref":"#/definitions/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.Revision":{"properties":{"date":{"type":"string"},"description":{"type":"string"},"number":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/definitions/advisory.RocheCVE"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"properties":{"affected_products":{"items":{"$ref":"#/definitions/advisory.RockwellAffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"properties":{"affectedProducts":{"items":{"type":"string"},"type":"array"},"buildReferences":{"items":{"type":"string"},"type":"array"},"cves":{"items":{"$ref":"#/definitions/advisory.RockyCve"},"type":"array"},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/definitions/advisory.RockyFix"},"type":"array"},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array"},"rpms":{"$ref":"#/definitions/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"properties":{"advisory":{"$ref":"#/definitions/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.RockyPackage"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/definitions/advisory.RockyVersion"},"type":"object"},"advisory.RockyVersion":{"properties":{"nvras":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Rsync":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"properties":{"advisory":{"$ref":"#/definitions/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/definitions/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/definitions/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"properties":{"arch":{"items":{"type":"string"},"type":"array"},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array"},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array"},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array"},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array"},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array"},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"properties":{"patched":{"items":{"type":"string"},"type":"array"},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SAAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"properties":{"document":{"$ref":"#/definitions/advisory.SiemensDocument"},"product_tree":{"$ref":"#/definitions/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.SiemensVulnerability"},"type":"array"}},"type":"object"},"advisory.SSDAdvisory":{"properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Safran":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Sandisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/definitions/advisory.SchneiderCVE"},"type":"array"},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ScoreSet":{"properties":{"baseScore":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.SecFix":{"properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvedetails":{"items":{"$ref":"#/definitions/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/definitions/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/definitions/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/definitions/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array"},"cnvd":{"items":{"type":"string"},"type":"array"},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"properties":{"names":{"items":{"type":"string"},"type":"array"},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"ssa":{"$ref":"#/definitions/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensSubBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"properties":{"text":{"type":"string"},"tlp":{"$ref":"#/definitions/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"properties":{"acknowledgments":{"items":{"$ref":"#/definitions/advisory.SiemensAcknowledgments"},"type":"array"},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/definitions/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/definitions/advisory.SiemensNotes"},"type":"array"},"publisher":{"$ref":"#/definitions/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/definitions/advisory.SiemensReferences"},"type":"array"},"title":{"type":"string"},"tracking":{"$ref":"#/definitions/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"properties":{"engine":{"$ref":"#/definitions/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/definitions/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"properties":{"model_numbers":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensProductStatus":{"properties":{"known_affected":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensProductTree":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensBranch"},"type":"array"}},"type":"object"},"advisory.SiemensPublisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"properties":{"cvss_v3":{"$ref":"#/definitions/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensSubBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensSubSubBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/definitions/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/definitions/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/definitions/advisory.SiemensRevisionHistory"},"type":"array"},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/definitions/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/definitions/advisory.SiemensNotes"},"type":"array"},"product_status":{"$ref":"#/definitions/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/definitions/advisory.SiemensReferences"},"type":"array"},"remediations":{"items":{"$ref":"#/definitions/advisory.SiemensRemediation"},"type":"array"},"scores":{"items":{"$ref":"#/definitions/advisory.SiemensScore"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array"},"sigma_rule":{"$ref":"#/definitions/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":true,"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array"},"fields":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/definitions/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"related":{"items":{"$ref":"#/definitions/advisory.RelatedRule"},"type":"array"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/definitions/advisory.SplunkProduct"},"type":"array"},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Status":{"properties":{"productID":{"items":{"type":"string"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Threat":{"properties":{"severity":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/definitions/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/definitions/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/definitions/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"},"vendor_names_for_threat_actors":{"items":{"$ref":"#/definitions/advisory.VendorNameForThreatActor"},"type":"array"},"vendors_and_products_targeted":{"items":{"$ref":"#/definitions/advisory.VendorProduct"},"type":"array"}},"type":"object"},"advisory.ThreatData":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Tibco":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.ToolRef"},"type":"array"}},"type":"object"},"advisory.ToolRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/definitions/advisory.RevisionHistory"},"type":"array"},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"properties":{"references":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Trustwave":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array"},"products":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"properties":{"affected_packages":{"items":{"$ref":"#/definitions/advisory.AffectedUbuntuPackage"},"type":"array"},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array"},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array"},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/definitions/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.Package"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.Reference"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/definitions/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.V3AcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.VCVulnerableCPEs":{"properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.VDEAdvisory":{"properties":{"csaf_json":{"$ref":"#/definitions/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"properties":{"affecting":{"items":{"type":"string"},"type":"array"},"credit":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"properties":{"config":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/definitions/advisory.ReportedExploit"},"type":"array"},"vulncheck_xdb":{"items":{"$ref":"#/definitions/advisory.XDB"},"type":"array"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnerability":{"properties":{"cve":{"type":"string"},"cvssscoreSets":{"$ref":"#/definitions/advisory.ScoreSet"},"description":{"type":"string"},"packages":{"description":"vulncheck addition","items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"productStatuses":{"items":{"$ref":"#/definitions/advisory.Status"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.CVRFReference"},"type":"array"},"threats":{"items":{"$ref":"#/definitions/advisory.Threat"},"type":"array"}},"type":"object"},"advisory.VulnerableDebianPackage":{"properties":{"associated_cves":{"items":{"$ref":"#/definitions/advisory.DebianCVE"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"properties":{"containers":{"$ref":"#/definitions/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/definitions/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"properties":{"adp":{"items":{"$ref":"#/definitions/advisory.ADP"},"type":"array"},"cna":{"$ref":"#/definitions/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/definitions/advisory.VulnrichmentOption"},"type":"array"},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"properties":{"other":{"$ref":"#/definitions/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"properties":{"content":{"$ref":"#/definitions/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.WolfiPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.WolfiSecFix"},"type":"array"}},"type":"object"},"advisory.WolfiSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"properties":{"cves":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array"},"filter_ids_dv":{"items":{"type":"string"},"type":"array"},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/definitions/advisory.ZDIProduct"},"type":"array"},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/definitions/advisory.ZDIResponse"},"type":"array"},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/definitions/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/definitions/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/definitions/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/definitions/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"properties":{"cvssV3":{"$ref":"#/definitions/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/definitions/api.CPEName"},"type":"array"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"properties":{"CVE_data_meta":{"$ref":"#/definitions/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/definitions/api.Description"},"problemtype":{"$ref":"#/definitions/api.ProblemType"},"references":{"$ref":"#/definitions/api.References"}},"type":"object"},"api.CVEDataMeta":{"properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"properties":{"CVE_data_meta":{"$ref":"#/definitions/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/definitions/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/definitions/api.Description"},"problemtype":{"$ref":"#/definitions/api.ProblemTypeExtended"},"references":{"$ref":"#/definitions/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"properties":{"tags":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.ClientFingerprints":{"properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/definitions/api.Nodes"},"type":"array"}},"type":"object"},"api.CveItems":{"properties":{"configurations":{"$ref":"#/definitions/api.Configurations"},"cve":{"$ref":"#/definitions/api.CVE"},"impact":{"$ref":"#/definitions/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/definitions/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.CveItemsExtended":{"properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/definitions/api.Configurations"},"cve":{"$ref":"#/definitions/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/definitions/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/definitions/api.MitreAttackTech"},"type":"array"},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/definitions/api.RelatedAttackPattern"},"type":"array"},"vcConfigurations":{"$ref":"#/definitions/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vulnerable_cpes":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.DateTime":{"properties":{"date":{"type":"string"}},"type":"object"},"api.Description":{"properties":{"description_data":{"items":{"$ref":"#/definitions/api.DescriptionData"},"type":"array"}},"type":"object"},"api.DescriptionData":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"properties":{"cves":{"items":{"$ref":"#/definitions/api.ExploitChainCVE"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/definitions/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"allOf":[{"$ref":"#/definitions/api.EPSS"}],"description":"exclude EPSS from changelog"},"exploits":{"items":{"$ref":"#/definitions/api.NormalizedExploitV3Entry"},"type":"array"},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/definitions/api.NormalizedReportV3Entry"},"type":"array"},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/definitions/api.ExploitsV3Timeline"},"trending":{"$ref":"#/definitions/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"properties":{"changes":{"items":{"$ref":"#/definitions/api.ExploitsChange"},"type":"array"},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"properties":{"baseMetricV2":{"$ref":"#/definitions/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"metricV40":{"allOf":[{"$ref":"#/definitions/advisory.CVSSV40"}],"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics"}},"type":"object"},"api.ImpactExtended":{"properties":{"baseMetricV2":{"$ref":"#/definitions/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"epss":{"$ref":"#/definitions/api.EPSS"},"metricV40":{"$ref":"#/definitions/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/definitions/api.SSVC"},"type":"array"},"temporalMetricV2":{"$ref":"#/definitions/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/definitions/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/definitions/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/definitions/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/definitions/api.InitialAccessArtifact"},"type":"array"},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array"}},"type":"object"},"api.InitialAccessArtifact":{"properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array"},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array"},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array"},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array"},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array"},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array"},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array"},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array"},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array"},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array"},"fofaRawQueries":{"items":{"type":"string"},"type":"array"},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array"},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array"},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array"},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array"},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array"},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array"},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array"},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array"},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.MitreAttackTech":{"properties":{"d3fendmapping":{"items":{"$ref":"#/definitions/api.MitreMitigation2D3fendMapping"},"type":"array"},"detections":{"items":{"$ref":"#/definitions/api.MitreDetectionTech"},"type":"array"},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/definitions/api.MitreMitigationTech"},"type":"array"},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"properties":{"cve_list":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"technique_id":{"$ref":"#/definitions/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"properties":{"d3fendtechniques":{"items":{"$ref":"#/definitions/api.MitreD3fendTechnique"},"type":"array"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/definitions/api.NVD20CPEName"},"type":"array"},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"descriptions":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/definitions/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/api.NVD20Reference"},"type":"array"},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vendorComments":{"items":{"$ref":"#/definitions/api.NVD20VendorComment"},"type":"array"},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/definitions/api.NVD20Weakness"},"type":"array"}},"type":"object"},"api.NVD20CVEExtended":{"properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/definitions/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/definitions/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/definitions/api.MitreAttackTech"},"type":"array"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/api.NVD20ReferenceExtended"},"type":"array"},"relatedAttackPatterns":{"items":{"$ref":"#/definitions/api.RelatedAttackPattern"},"type":"array"},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vendorComments":{"items":{"$ref":"#/definitions/api.NVD20VendorComment"},"type":"array"},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array"},"weaknesses":{"items":{"$ref":"#/definitions/api.NVD20WeaknessExtended"},"type":"array"}},"type":"object"},"api.NVD20CvssDataV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/definitions/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"properties":{"cvssData":{"$ref":"#/definitions/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"properties":{"cvssData":{"$ref":"#/definitions/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV2"},"type":"array"},"cvssMetricV30":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV31":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV40":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV40"},"type":"array"}},"type":"object"},"api.NVD20MetricExtended":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV2"},"type":"array"},"cvssMetricV30":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV31":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV40":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV40"},"type":"array"},"epss":{"$ref":"#/definitions/api.EPSS"},"ssvc":{"items":{"$ref":"#/definitions/api.SSVC"},"type":"array"},"temporalCVSSV2":{"$ref":"#/definitions/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV2"},"type":"array"},"temporalCVSSV30":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"type":"array"},"temporalCVSSV31":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"type":"array"},"threatCVSSV40":{"$ref":"#/definitions/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/definitions/api.NVD20ThreatCVSSV40"},"type":"array"}},"type":"object"},"api.NVD20Reference":{"properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"properties":{"associatedBaseMetricV2":{"$ref":"#/definitions/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"properties":{"associatedBaseMetricV3":{"$ref":"#/definitions/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"properties":{"associatedBaseMetricV40":{"$ref":"#/definitions/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"properties":{"description":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"properties":{"description":{"items":{"$ref":"#/definitions/api.NVD20WeaknessDescExtended"},"type":"array"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"properties":{"children":{"items":{"$ref":"#/definitions/api.Nodes"},"type":"array"},"cpe_match":{"items":{"$ref":"#/definitions/api.CPEMatch"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"properties":{"artifacts":{"$ref":"#/definitions/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array"},"licenses":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array"},"research_attributes":{"$ref":"#/definitions/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"api.OSSPackageArtifacts":{"properties":{"binary":{"items":{"$ref":"#/definitions/api.OSSPackageDownloadInfo"},"type":"array"},"source":{"items":{"$ref":"#/definitions/api.OSSPackageDownloadInfo"},"type":"array"}},"type":"object"},"api.OSSPackageDownloadInfo":{"properties":{"hashes":{"items":{"$ref":"#/definitions/api.OSSPackageHashInfo"},"type":"array"},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"properties":{"problemtype_data":{"items":{"$ref":"#/definitions/api.ProblemTypeData"},"type":"array"}},"type":"object"},"api.ProblemTypeData":{"properties":{"description":{"items":{"$ref":"#/definitions/api.ProblemTypeDescription"},"type":"array"}},"type":"object"},"api.ProblemTypeDataExtended":{"properties":{"description":{"items":{"$ref":"#/definitions/api.ProblemTypeDescriptionExtended"},"type":"array"}},"type":"object"},"api.ProblemTypeDescription":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"properties":{"problemtype_data":{"items":{"$ref":"#/definitions/api.ProblemTypeDataExtended"},"type":"array"}},"type":"object"},"api.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.References":{"properties":{"reference_data":{"items":{"$ref":"#/definitions/api.ReferenceData"},"type":"array"}},"type":"object"},"api.ReferencesExtended":{"properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/definitions/api.ReferenceDataExtended"},"type":"array"}},"type":"object"},"api.RelatedAttackPattern":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"properties":{"cvssV2":{"$ref":"#/definitions/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"properties":{"cvssV3":{"$ref":"#/definitions/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/definitions/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/api.Package"},"type":"array"},"references":{"items":{"$ref":"#/definitions/api.Reference"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/definitions/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/definitions/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/definitions/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"models.Entitlements":{"properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/definitions/paginate.Match"},"type":"array"},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array"},"parameters":{"items":{"$ref":"#/definitions/paginate.Param"},"type":"array"},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array"}},"type":"object"},"paginate.Param":{"properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array"},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"allOf":[{"$ref":"#/definitions/purl.PackageURLJSON"}],"description":"meta-data about the purl"},"research_attributes":{"$ref":"#/definitions/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"purl.PackageURLJSON":{"properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/definitions/purl.QualifierJSON"},"type":"array"},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"type":"object"},"purls.PurlResponse":{"properties":{"artifacts":{"$ref":"#/definitions/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array"},"licenses":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/purls.Vulnerability"},"type":"array"}},"type":"object"},"purls.Vulnerability":{"properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/definitions/params.IndexBackupList"},"type":"array"}},"type":"object"},"render.Response-array_params_IndexList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/definitions/params.IndexList"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.A10"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ABBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AIX"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AMD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AMI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ASRG"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AVEVAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AVIDMLAdvs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AWS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Abbott"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Absolute"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Acronis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AdobeAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Advantech"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Advisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AdvisoryRecord"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlephResearch"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Alibaba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlmaLinuxUpdate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AmazonCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AnchoreNVDOverride"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AndroidAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheActiveMQ"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheArchiva"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheArrow"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCamel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCommons"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCouchDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheFlink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheGuacamole"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheHTTP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheHadoop"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheJSPWiki"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheKafka"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheLoggingServices"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheNiFi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOFBiz"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOpenMeetings"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOpenOffice"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApachePulsar"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheShiro"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSpark"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheStruts"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSubversion"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSuperset"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheTomcat"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheZooKeeper"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AppCheck"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Appgate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AppleAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ArchIssue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Arista"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Aruba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AssetNote"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Asterisk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Astra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Asus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AtlassianAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AtlassianVuln"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Atredis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Audiocodes"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AusCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Autodesk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Avaya"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Avigilon"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Axis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Azul"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BBraunAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BDUAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Bandr"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BaxterAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeckhoffAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeckmanCoulter"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BectonDickinsonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeldenAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeyondTrust"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Binarly"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BitDefender"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BlackBerry"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BoschAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BostonScientificAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Botnet"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CACyberCentreAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CBLMariner"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CERTEUAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CESA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CISAAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNNVDEntryJSON"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNVDBulletin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNVDFlaw"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CanvasExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CarestreamAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Carrier"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertBE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertFRAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertIN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertIRSecurityAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertSE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertUA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ChainGuard"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CheckPoint"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Chrome"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ciena"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CisaCsafAdv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoKnownGoodValue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CitrixAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ClarotyVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CloudBees"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CloudVulnDBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CodesysAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CommVault"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CompassSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ContainerOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CoreImpactExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Crestron"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CrowdSec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Curl"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Cvrf"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DFNCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DNN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dahua"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Danfoss"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dassault"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DebianSecurityAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DeltaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DistroPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Django"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DotCMS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DragosAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Draytek"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Drupal"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLAlibaba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLMicrosoft"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLReleaseData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EUVD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EatonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Elastic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Elspec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EmergingThreatsSnort"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EmersonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EndOfLife"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Endress"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ExodusIntel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ExploitDBExploitv2"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.F5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FSecure"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fanuc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fastly"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Festo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FileCloud"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FileZilla"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FlattSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ForgeRock"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FortinetAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FortinetIPS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Foxit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fresenius"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GCP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GEGas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GEHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GHAdvisoryJSONLean"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GHSA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GMOCyberSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gallagher"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gen"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Genetec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gigabyte"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitHubExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitLabExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GiteeExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitlabAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Glibc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GnuTLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GoVulnJSON"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Grafana"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GreyNoiseDetection"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HCL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HIKVision"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HKCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HMS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HPE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Hacktivity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HarmonyOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HashiCorp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HaskellSADBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HillromAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Hitachi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HitachiEnergy"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Honeywell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Huawei"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HuaweiEulerOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HuaweiIPS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IAVA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IBM"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ITWExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Idemia"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Igel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IncibeAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Intel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IpIntelRecord"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IsraeliAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IsraeliVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Istio"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ivanti"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IvantiRSS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JFrog"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JNJAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JVN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JVNAdvisoryItem"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Jenkins"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JetBrains"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JohnsonControls"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Juniper"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.K8S"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KEVCatalogVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KRCertAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KasperskyICSCERTAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KoreLogic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Kunbus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LG"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Lantronix"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Lenovo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LexmarkAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LibreOffice"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Linux"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LolAdvs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MACert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MFiles"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MaliciousPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ManageEngineAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MbedTLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.McAfee"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mediatek"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MedtronicAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mendix"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetaData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetasploitExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftCVRF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftDriverBlockList"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftKb"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mikrotik"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mindray"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MispValue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mitel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MitreCVEListV5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MitsubishiElectricAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MongoDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MoxaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MozillaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NCSC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NCSCCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NEC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NHS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NTP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NVD20Source"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NVDCPEDictionary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NZAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Naver"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nessus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NetApp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netatalk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netgate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netgear"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netskope"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nexpose"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NginxAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NodeJS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NodeSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nokia"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NotePadPlusPlus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nozomi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nuclei"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OSV"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OTRS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OctopusDeploy"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Okta"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Omron"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OneE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenBSD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenCVDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenJDK"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenSSH"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenSSLSecAdv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenStack"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Opengear"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OracleCPU"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OracleCPUCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OwnCloud"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PHPMyAdmin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PKCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PTC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PacketstormExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Palantir"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PaloAltoAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Panasonic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PaperCut"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Pega"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PhilipsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PhoenixContactAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PostgresSQL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PowerDNS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Progress"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Proofpoint"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PureStorage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PyPAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QNAPAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QQID"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QSB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Qualcomm"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Qualys"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QualysQID"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RansomwareExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RedLion"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RedhatCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Renesas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Revive"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RhelCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Roche"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Rockwell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RockyErrata"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Rsync"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ruckus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RustsecAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SAP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SECConsult"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SSDAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Safran"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SaintExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SalesForce"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Samba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sandisk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SansDshield"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SchneiderElectricAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Schutzwerk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SecurityBulletin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SecurityLab"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SeebugExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SentinelOne"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ServiceNow"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SevenZip"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ShadowServerExploitedVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Shielder"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sick"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SiemensAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SierraWireless"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SigmaRule"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SingCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sitecore"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Slackware"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SolarWindsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Solr"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sonatype"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SonicWallAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SpacelabsHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Splunk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Spring"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Stormshield"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.StrykerAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sudo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SuseSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SwisslogHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Symfony"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Synacktiv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SyncroSoft"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Synology"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Syss"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TPLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TWCertAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tailscale"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TalosAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TeamViewer"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TenableResearchAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tencent"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Thales"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TheMissingLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ThermoFisher"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ThreatActorWithExternalObjects"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tibco"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TraneTechnology"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TrendMicro"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Trustwave"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.USD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.USOMAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ubiquiti"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.UbuntuCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Unify"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Unisoc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Update"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VCCPEDictionary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VCVulnerableCPEs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VDEAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VLC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VMWareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VYAIREAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VanDyke"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VapidLabsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Veeam"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Veritas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Virtuozzo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VoidSec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheck"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckCVEListV5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckConfig"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckKEV"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnerableDebianPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Vulnrichment"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WRT"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WatchGuard"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WhatsApp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wibu"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wireshark"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WithSecure"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WolfSSL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wolfi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wordfence"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xen"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xerox"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xiaomi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xylem"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Yamaha"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.YokogawaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Yubico"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zebra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ZeroDayAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ZeroScienceAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zimbra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zoom"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zscaler"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zuso"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zyxel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CWE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CveItems"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CveItemsExtended"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.EPSSData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitChain"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitV3Result"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitsChangelog"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.InitialAccess"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.MitreAttackToCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CPEMatch"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CVEExtended"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.OSSPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.Update"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.VulnCheckCanary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.VulnerabilityAlias"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/purls.PurlResponse"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/definitions/params.IndexBackup"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/definitions/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/definitions/purl.BatchVulnFinding"},"type":"array"}},"type":"object"},"v3controllers.BackupResponseMetadata":{"properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"v3controllers.PurlResponseMetadata":{"properties":{"purl_struct":{"allOf":[{"$ref":"#/definitions/purl.PackageURLJSON"}],"description":"meta-data about the purl"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/definitions/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"Version 3 of the VulnCheck API","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"3.0"},"paths":{"/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.Response-array_params_IndexBackupList"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","hms","honeywell","hp","hpe","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","metasploit","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","red-lion","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"in":"path","name":"index","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"type":"string"},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/entitlements":{"get":{"description":"Retrieve entitlements for the current user","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/models.Entitlements"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.Response-array_params_IndexList"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/index/hms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HMS (Hardware Meets Software) Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hms\"","tags":["indices"]}},"/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/index/red-lion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red-Lion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/red-lion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"red-lion\"","tags":["indices"]}},"/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"additionalProperties":true,"type":"object"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","enum":["txt","json","text"],"in":"query","name":"format","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","parameters":[{"description":"PURL strings used to identify and locate software packages","in":"body","name":"purls","required":true,"schema":{"items":{"type":"string"},"type":"array"}}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","parameters":[{"description":"Type of ruleset to retrieve","enum":["snort","suricata"],"in":"path","name":"type","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","enum":["txt","json","text"],"in":"query","name":"format","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}}},"securityDefinitions":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}},"swagger":"2.0"} \ No newline at end of file diff --git a/pyproject.toml b/pyproject.toml index 80c838e..d7f1ef2 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,6 +1,6 @@ [project] name = "vulncheck_sdk" -version = "0.0.35" +version = "0.0.36" description = "VulnCheck API" authors = [ {name = "VulnCheck API Support",email = "support@vulncheck.com"}, diff --git a/python-generator-config.yaml b/python-generator-config.yaml index d144ac8..fdc179b 100644 --- a/python-generator-config.yaml +++ b/python-generator-config.yaml @@ -2,4 +2,4 @@ additionalProperties: projectName: "vulncheck-sdk" packageName: "vulncheck_sdk" packageUrl: "https://github.com/vulncheck-oss/sdk-python/tree/main" - packageVersion: "0.0.35" + packageVersion: "0.0.36" diff --git a/setup.py b/setup.py index d6b3c14..5fcf496 100644 --- a/setup.py +++ b/setup.py @@ -22,7 +22,7 @@ # prerequisite: setuptools # http://pypi.python.org/pypi/setuptools NAME = "vulncheck-sdk" -VERSION = "0.0.35" +VERSION = "0.0.36" PYTHON_REQUIRES = ">= 3.9" REQUIRES = [ "urllib3 >= 2.1.0, < 3.0.0", diff --git a/test/test_advisory_hms.py b/test/test_advisory_hms.py new file mode 100644 index 0000000..46e7e1c --- /dev/null +++ b/test/test_advisory_hms.py @@ -0,0 +1,63 @@ +# coding: utf-8 + +""" + VulnCheck API + + Version 3 of the VulnCheck API + + The version of the OpenAPI document: 3.0 + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.advisory_hms import AdvisoryHMS + +class TestAdvisoryHMS(unittest.TestCase): + """AdvisoryHMS unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryHMS: + """Test AdvisoryHMS + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryHMS` + """ + model = AdvisoryHMS() + if include_optional: + return AdvisoryHMS( + affected_products = '', + cve = [ + '' + ], + date_added = '', + id = '', + impact = '', + mitigation = '', + summary = '', + title = '', + updated_at = '', + url = '' + ) + else: + return AdvisoryHMS( + ) + """ + + def testAdvisoryHMS(self): + """Test AdvisoryHMS""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_advisory_red_lion.py b/test/test_advisory_red_lion.py new file mode 100644 index 0000000..59523f8 --- /dev/null +++ b/test/test_advisory_red_lion.py @@ -0,0 +1,58 @@ +# coding: utf-8 + +""" + VulnCheck API + + Version 3 of the VulnCheck API + + The version of the OpenAPI document: 3.0 + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.advisory_red_lion import AdvisoryRedLion + +class TestAdvisoryRedLion(unittest.TestCase): + """AdvisoryRedLion unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryRedLion: + """Test AdvisoryRedLion + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryRedLion` + """ + model = AdvisoryRedLion() + if include_optional: + return AdvisoryRedLion( + cve = [ + '' + ], + date_added = '', + title = '', + updated_at = '', + url = '' + ) + else: + return AdvisoryRedLion( + ) + """ + + def testAdvisoryRedLion(self): + """Test AdvisoryRedLion""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_indices_api.py b/test/test_indices_api.py index 72fef01..32645e6 100644 --- a/test/test_indices_api.py +++ b/test/test_indices_api.py @@ -1525,6 +1525,13 @@ def test_index_hkcert_get(self) -> None: """ pass + def test_index_hms_get(self) -> None: + """Test case for index_hms_get + + Return vulnerability data stored in index \"hms\" + """ + pass + def test_index_honeywell_get(self) -> None: """Test case for index_honeywell_get @@ -2526,6 +2533,13 @@ def test_index_ransomware_get(self) -> None: """ pass + def test_index_red_lion_get(self) -> None: + """Test case for index_red_lion_get + + Return vulnerability data stored in index \"red-lion\" + """ + pass + def test_index_redhat_cves_get(self) -> None: """Test case for index_redhat_cves_get diff --git a/test/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py b/test/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py new file mode 100644 index 0000000..0a4730d --- /dev/null +++ b/test/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py @@ -0,0 +1,101 @@ +# coding: utf-8 + +""" + VulnCheck API + + Version 3 of the VulnCheck API + + The version of the OpenAPI document: 3.0 + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hms_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination + +class TestRenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination(unittest.TestCase): + """RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination: + """Test RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination` + """ + model = RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination() + if include_optional: + return RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination( + benchmark = 1.337, + meta = vulncheck_sdk.models.paginate/pagination.paginate.Pagination( + cursor = '', + first_item = 56, + index = '', + last_item = 56, + limit = 56, + matches = [ + vulncheck_sdk.models.paginate/match.paginate.Match( + field = '', + value = '', ) + ], + max_pages = 56, + next_cursor = '', + opensearch_query = vulncheck_sdk.models.opensearch_query.opensearch_query(), + order = '', + page = 56, + pages = [ + '' + ], + parameters = [ + vulncheck_sdk.models.paginate/param.paginate.Param( + filtering = '', + format = '', + name = '', ) + ], + show_pages = True, + show_query = True, + sort = '', + timestamp = '', + total_documents = 56, + total_pages = 56, + warnings = [ + '' + ], ), + data = [ + vulncheck_sdk.models.advisory/hms.advisory.HMS( + affected_products = '', + cve = [ + '' + ], + date_added = '', + id = '', + impact = '', + mitigation = '', + summary = '', + title = '', + updated_at = '', + url = '', ) + ] + ) + else: + return RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination( + ) + """ + + def testRenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination(self): + """Test RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py b/test/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py new file mode 100644 index 0000000..0b153e5 --- /dev/null +++ b/test/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py @@ -0,0 +1,96 @@ +# coding: utf-8 + +""" + VulnCheck API + + Version 3 of the VulnCheck API + + The version of the OpenAPI document: 3.0 + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_red_lion_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination + +class TestRenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination(unittest.TestCase): + """RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: + """Test RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination` + """ + model = RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination() + if include_optional: + return RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination( + benchmark = 1.337, + meta = vulncheck_sdk.models.paginate/pagination.paginate.Pagination( + cursor = '', + first_item = 56, + index = '', + last_item = 56, + limit = 56, + matches = [ + vulncheck_sdk.models.paginate/match.paginate.Match( + field = '', + value = '', ) + ], + max_pages = 56, + next_cursor = '', + opensearch_query = vulncheck_sdk.models.opensearch_query.opensearch_query(), + order = '', + page = 56, + pages = [ + '' + ], + parameters = [ + vulncheck_sdk.models.paginate/param.paginate.Param( + filtering = '', + format = '', + name = '', ) + ], + show_pages = True, + show_query = True, + sort = '', + timestamp = '', + total_documents = 56, + total_pages = 56, + warnings = [ + '' + ], ), + data = [ + vulncheck_sdk.models.advisory/red_lion.advisory.RedLion( + cve = [ + '' + ], + date_added = '', + title = '', + updated_at = '', + url = '', ) + ] + ) + else: + return RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination( + ) + """ + + def testRenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination(self): + """Test RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/vulncheck_sdk/__init__.py b/vulncheck_sdk/__init__.py index 6ba5bb3..995b21e 100644 --- a/vulncheck_sdk/__init__.py +++ b/vulncheck_sdk/__init__.py @@ -15,7 +15,7 @@ """ # noqa: E501 -__version__ = "0.0.35" +__version__ = "0.0.36" # Define package exports __all__ = [ @@ -339,6 +339,7 @@ "AdvisoryHCL", "AdvisoryHIKVision", "AdvisoryHKCert", + "AdvisoryHMS", "AdvisoryHP", "AdvisoryHPE", "AdvisoryHacktivity", @@ -573,6 +574,7 @@ "AdvisoryRange", "AdvisoryRansomwareExploit", "AdvisoryRecordType", + "AdvisoryRedLion", "AdvisoryRedhatCVE", "AdvisoryReference", "AdvisoryRelatedRule", @@ -1068,6 +1070,7 @@ "RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination", + "RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination", @@ -1202,6 +1205,7 @@ "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", @@ -1675,6 +1679,7 @@ from vulncheck_sdk.models.advisory_hcl import AdvisoryHCL as AdvisoryHCL from vulncheck_sdk.models.advisory_hik_vision import AdvisoryHIKVision as AdvisoryHIKVision from vulncheck_sdk.models.advisory_hk_cert import AdvisoryHKCert as AdvisoryHKCert +from vulncheck_sdk.models.advisory_hms import AdvisoryHMS as AdvisoryHMS from vulncheck_sdk.models.advisory_hp import AdvisoryHP as AdvisoryHP from vulncheck_sdk.models.advisory_hpe import AdvisoryHPE as AdvisoryHPE from vulncheck_sdk.models.advisory_hacktivity import AdvisoryHacktivity as AdvisoryHacktivity @@ -1909,6 +1914,7 @@ from vulncheck_sdk.models.advisory_range import AdvisoryRange as AdvisoryRange from vulncheck_sdk.models.advisory_ransomware_exploit import AdvisoryRansomwareExploit as AdvisoryRansomwareExploit from vulncheck_sdk.models.advisory_record_type import AdvisoryRecordType as AdvisoryRecordType +from vulncheck_sdk.models.advisory_red_lion import AdvisoryRedLion as AdvisoryRedLion from vulncheck_sdk.models.advisory_redhat_cve import AdvisoryRedhatCVE as AdvisoryRedhatCVE from vulncheck_sdk.models.advisory_reference import AdvisoryReference as AdvisoryReference from vulncheck_sdk.models.advisory_related_rule import AdvisoryRelatedRule as AdvisoryRelatedRule @@ -2404,6 +2410,7 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hcl_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination as RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hik_vision_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination as RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hk_cert_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination as RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hms_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination as RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hpe_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination as RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hp_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination as RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hacktivity_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination as RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination @@ -2538,6 +2545,7 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qualys_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination as RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination as RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination as RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_red_lion_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination as RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination as RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_renesas_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination as RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_revive_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination as RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination diff --git a/vulncheck_sdk/api/indices_api.py b/vulncheck_sdk/api/indices_api.py index ef4e71e..03aae2e 100644 --- a/vulncheck_sdk/api/indices_api.py +++ b/vulncheck_sdk/api/indices_api.py @@ -205,6 +205,7 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hcl_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hik_vision_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hk_cert_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hms_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hpe_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hp_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hacktivity_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination @@ -339,6 +340,7 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qualys_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_red_lion_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_renesas_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_revive_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination @@ -138098,7 +138100,7 @@ def _index_hkcert_get_serialize( @validate_call - def index_honeywell_get( + def index_hms_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -138135,10 +138137,10 @@ def index_honeywell_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination: - """Return vulnerability data stored in index \"honeywell\" + ) -> RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination: + """Return vulnerability data stored in index \"hms\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Honeywell Cyber Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/honeywell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hms index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HMS (Hardware Meets Software) Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hms?cursor=` :param page: set the page number of the response :type page: int @@ -138208,7 +138210,7 @@ def index_honeywell_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_honeywell_get_serialize( + _param = self._index_hms_get_serialize( page=page, limit=limit, cursor=cursor, @@ -138239,7 +138241,7 @@ def index_honeywell_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination", '404': "str", '500': "str", } @@ -138255,7 +138257,7 @@ def index_honeywell_get( @validate_call - def index_honeywell_get_with_http_info( + def index_hms_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -138292,10 +138294,10 @@ def index_honeywell_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination]: - """Return vulnerability data stored in index \"honeywell\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination]: + """Return vulnerability data stored in index \"hms\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Honeywell Cyber Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/honeywell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hms index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HMS (Hardware Meets Software) Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hms?cursor=` :param page: set the page number of the response :type page: int @@ -138365,7 +138367,7 @@ def index_honeywell_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_honeywell_get_serialize( + _param = self._index_hms_get_serialize( page=page, limit=limit, cursor=cursor, @@ -138396,7 +138398,7 @@ def index_honeywell_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination", '404': "str", '500': "str", } @@ -138412,7 +138414,7 @@ def index_honeywell_get_with_http_info( @validate_call - def index_honeywell_get_without_preload_content( + def index_hms_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -138450,9 +138452,9 @@ def index_honeywell_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"honeywell\" + """Return vulnerability data stored in index \"hms\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Honeywell Cyber Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/honeywell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hms index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HMS (Hardware Meets Software) Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hms?cursor=` :param page: set the page number of the response :type page: int @@ -138522,7 +138524,7 @@ def index_honeywell_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_honeywell_get_serialize( + _param = self._index_hms_get_serialize( page=page, limit=limit, cursor=cursor, @@ -138553,7 +138555,7 @@ def index_honeywell_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination", '404': "str", '500': "str", } @@ -138564,7 +138566,7 @@ def index_honeywell_get_without_preload_content( return response_data.response - def _index_honeywell_get_serialize( + def _index_hms_get_serialize( self, page, limit, @@ -138724,7 +138726,7 @@ def _index_honeywell_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/honeywell', + resource_path='/index/hms', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -138741,7 +138743,7 @@ def _index_honeywell_get_serialize( @validate_call - def index_hp_get( + def index_honeywell_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -138778,10 +138780,10 @@ def index_hp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination: - """Return vulnerability data stored in index \"hp\" + ) -> RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination: + """Return vulnerability data stored in index \"honeywell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Honeywell Cyber Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/honeywell?cursor=` :param page: set the page number of the response :type page: int @@ -138851,7 +138853,7 @@ def index_hp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hp_get_serialize( + _param = self._index_honeywell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -138882,7 +138884,7 @@ def index_hp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination", '404': "str", '500': "str", } @@ -138898,7 +138900,7 @@ def index_hp_get( @validate_call - def index_hp_get_with_http_info( + def index_honeywell_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -138935,10 +138937,10 @@ def index_hp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination]: - """Return vulnerability data stored in index \"hp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination]: + """Return vulnerability data stored in index \"honeywell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Honeywell Cyber Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/honeywell?cursor=` :param page: set the page number of the response :type page: int @@ -139008,7 +139010,7 @@ def index_hp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hp_get_serialize( + _param = self._index_honeywell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -139039,7 +139041,7 @@ def index_hp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination", '404': "str", '500': "str", } @@ -139055,7 +139057,7 @@ def index_hp_get_with_http_info( @validate_call - def index_hp_get_without_preload_content( + def index_honeywell_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -139093,9 +139095,9 @@ def index_hp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"hp\" + """Return vulnerability data stored in index \"honeywell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Honeywell Cyber Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/honeywell?cursor=` :param page: set the page number of the response :type page: int @@ -139165,7 +139167,7 @@ def index_hp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hp_get_serialize( + _param = self._index_honeywell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -139196,7 +139198,7 @@ def index_hp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination", '404': "str", '500': "str", } @@ -139207,7 +139209,7 @@ def index_hp_get_without_preload_content( return response_data.response - def _index_hp_get_serialize( + def _index_honeywell_get_serialize( self, page, limit, @@ -139367,7 +139369,7 @@ def _index_hp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/hp', + resource_path='/index/honeywell', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -139384,7 +139386,7 @@ def _index_hp_get_serialize( @validate_call - def index_hpe_get( + def index_hp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -139421,10 +139423,10 @@ def index_hpe_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination: - """Return vulnerability data stored in index \"hpe\" + ) -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination: + """Return vulnerability data stored in index \"hp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` :param page: set the page number of the response :type page: int @@ -139494,7 +139496,7 @@ def index_hpe_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hpe_get_serialize( + _param = self._index_hp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -139525,7 +139527,7 @@ def index_hpe_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", '404': "str", '500': "str", } @@ -139541,7 +139543,7 @@ def index_hpe_get( @validate_call - def index_hpe_get_with_http_info( + def index_hp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -139578,10 +139580,10 @@ def index_hpe_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination]: - """Return vulnerability data stored in index \"hpe\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination]: + """Return vulnerability data stored in index \"hp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` :param page: set the page number of the response :type page: int @@ -139651,7 +139653,7 @@ def index_hpe_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hpe_get_serialize( + _param = self._index_hp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -139682,7 +139684,7 @@ def index_hpe_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", '404': "str", '500': "str", } @@ -139698,7 +139700,7 @@ def index_hpe_get_with_http_info( @validate_call - def index_hpe_get_without_preload_content( + def index_hp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -139736,9 +139738,9 @@ def index_hpe_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"hpe\" + """Return vulnerability data stored in index \"hp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` :param page: set the page number of the response :type page: int @@ -139808,7 +139810,7 @@ def index_hpe_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hpe_get_serialize( + _param = self._index_hp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -139839,7 +139841,7 @@ def index_hpe_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", '404': "str", '500': "str", } @@ -139850,7 +139852,7 @@ def index_hpe_get_without_preload_content( return response_data.response - def _index_hpe_get_serialize( + def _index_hp_get_serialize( self, page, limit, @@ -140010,7 +140012,7 @@ def _index_hpe_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/hpe', + resource_path='/index/hp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -140027,7 +140029,7 @@ def _index_hpe_get_serialize( @validate_call - def index_huawei_euleros_get( + def index_hpe_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -140064,10 +140066,10 @@ def index_huawei_euleros_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination: - """Return vulnerability data stored in index \"huawei-euleros\" + ) -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination: + """Return vulnerability data stored in index \"hpe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` :param page: set the page number of the response :type page: int @@ -140137,7 +140139,7 @@ def index_huawei_euleros_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_euleros_get_serialize( + _param = self._index_hpe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -140168,7 +140170,7 @@ def index_huawei_euleros_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", '404': "str", '500': "str", } @@ -140184,7 +140186,7 @@ def index_huawei_euleros_get( @validate_call - def index_huawei_euleros_get_with_http_info( + def index_hpe_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -140221,10 +140223,10 @@ def index_huawei_euleros_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination]: - """Return vulnerability data stored in index \"huawei-euleros\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination]: + """Return vulnerability data stored in index \"hpe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` :param page: set the page number of the response :type page: int @@ -140294,7 +140296,7 @@ def index_huawei_euleros_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_euleros_get_serialize( + _param = self._index_hpe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -140325,7 +140327,7 @@ def index_huawei_euleros_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", '404': "str", '500': "str", } @@ -140341,7 +140343,7 @@ def index_huawei_euleros_get_with_http_info( @validate_call - def index_huawei_euleros_get_without_preload_content( + def index_hpe_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -140379,9 +140381,9 @@ def index_huawei_euleros_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"huawei-euleros\" + """Return vulnerability data stored in index \"hpe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` :param page: set the page number of the response :type page: int @@ -140451,7 +140453,7 @@ def index_huawei_euleros_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_euleros_get_serialize( + _param = self._index_hpe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -140482,7 +140484,7 @@ def index_huawei_euleros_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", '404': "str", '500': "str", } @@ -140493,7 +140495,7 @@ def index_huawei_euleros_get_without_preload_content( return response_data.response - def _index_huawei_euleros_get_serialize( + def _index_hpe_get_serialize( self, page, limit, @@ -140653,7 +140655,7 @@ def _index_huawei_euleros_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/huawei-euleros', + resource_path='/index/hpe', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -140670,7 +140672,7 @@ def _index_huawei_euleros_get_serialize( @validate_call - def index_huawei_ips_get( + def index_huawei_euleros_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -140707,10 +140709,10 @@ def index_huawei_ips_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination: - """Return vulnerability data stored in index \"huawei-ips\" + ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination: + """Return vulnerability data stored in index \"huawei-euleros\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` :param page: set the page number of the response :type page: int @@ -140780,7 +140782,7 @@ def index_huawei_ips_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_ips_get_serialize( + _param = self._index_huawei_euleros_get_serialize( page=page, limit=limit, cursor=cursor, @@ -140811,7 +140813,7 @@ def index_huawei_ips_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", '404': "str", '500': "str", } @@ -140827,7 +140829,7 @@ def index_huawei_ips_get( @validate_call - def index_huawei_ips_get_with_http_info( + def index_huawei_euleros_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -140864,10 +140866,10 @@ def index_huawei_ips_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination]: - """Return vulnerability data stored in index \"huawei-ips\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination]: + """Return vulnerability data stored in index \"huawei-euleros\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` :param page: set the page number of the response :type page: int @@ -140937,7 +140939,7 @@ def index_huawei_ips_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_ips_get_serialize( + _param = self._index_huawei_euleros_get_serialize( page=page, limit=limit, cursor=cursor, @@ -140968,7 +140970,7 @@ def index_huawei_ips_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", '404': "str", '500': "str", } @@ -140984,7 +140986,7 @@ def index_huawei_ips_get_with_http_info( @validate_call - def index_huawei_ips_get_without_preload_content( + def index_huawei_euleros_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -141022,9 +141024,9 @@ def index_huawei_ips_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"huawei-ips\" + """Return vulnerability data stored in index \"huawei-euleros\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` :param page: set the page number of the response :type page: int @@ -141094,7 +141096,7 @@ def index_huawei_ips_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_ips_get_serialize( + _param = self._index_huawei_euleros_get_serialize( page=page, limit=limit, cursor=cursor, @@ -141125,7 +141127,7 @@ def index_huawei_ips_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", '404': "str", '500': "str", } @@ -141136,7 +141138,7 @@ def index_huawei_ips_get_without_preload_content( return response_data.response - def _index_huawei_ips_get_serialize( + def _index_huawei_euleros_get_serialize( self, page, limit, @@ -141296,7 +141298,7 @@ def _index_huawei_ips_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/huawei-ips', + resource_path='/index/huawei-euleros', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -141313,7 +141315,7 @@ def _index_huawei_ips_get_serialize( @validate_call - def index_huawei_psirt_get( + def index_huawei_ips_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -141350,10 +141352,10 @@ def index_huawei_psirt_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination: - """Return vulnerability data stored in index \"huawei-psirt\" + ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination: + """Return vulnerability data stored in index \"huawei-ips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` :param page: set the page number of the response :type page: int @@ -141423,7 +141425,7 @@ def index_huawei_psirt_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_psirt_get_serialize( + _param = self._index_huawei_ips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -141454,7 +141456,7 @@ def index_huawei_psirt_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", '404': "str", '500': "str", } @@ -141470,7 +141472,7 @@ def index_huawei_psirt_get( @validate_call - def index_huawei_psirt_get_with_http_info( + def index_huawei_ips_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -141507,10 +141509,10 @@ def index_huawei_psirt_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination]: - """Return vulnerability data stored in index \"huawei-psirt\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination]: + """Return vulnerability data stored in index \"huawei-ips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` :param page: set the page number of the response :type page: int @@ -141580,7 +141582,7 @@ def index_huawei_psirt_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_psirt_get_serialize( + _param = self._index_huawei_ips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -141611,7 +141613,7 @@ def index_huawei_psirt_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", '404': "str", '500': "str", } @@ -141627,7 +141629,7 @@ def index_huawei_psirt_get_with_http_info( @validate_call - def index_huawei_psirt_get_without_preload_content( + def index_huawei_ips_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -141665,9 +141667,9 @@ def index_huawei_psirt_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"huawei-psirt\" + """Return vulnerability data stored in index \"huawei-ips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` :param page: set the page number of the response :type page: int @@ -141737,7 +141739,7 @@ def index_huawei_psirt_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_psirt_get_serialize( + _param = self._index_huawei_ips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -141768,7 +141770,7 @@ def index_huawei_psirt_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", '404': "str", '500': "str", } @@ -141779,7 +141781,7 @@ def index_huawei_psirt_get_without_preload_content( return response_data.response - def _index_huawei_psirt_get_serialize( + def _index_huawei_ips_get_serialize( self, page, limit, @@ -141939,7 +141941,7 @@ def _index_huawei_psirt_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/huawei-psirt', + resource_path='/index/huawei-ips', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -141956,7 +141958,7 @@ def _index_huawei_psirt_get_serialize( @validate_call - def index_iava_get( + def index_huawei_psirt_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -141993,10 +141995,10 @@ def index_iava_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination: - """Return vulnerability data stored in index \"iava\" + ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination: + """Return vulnerability data stored in index \"huawei-psirt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` :param page: set the page number of the response :type page: int @@ -142066,7 +142068,7 @@ def index_iava_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_iava_get_serialize( + _param = self._index_huawei_psirt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -142097,7 +142099,7 @@ def index_iava_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", '404': "str", '500': "str", } @@ -142113,7 +142115,7 @@ def index_iava_get( @validate_call - def index_iava_get_with_http_info( + def index_huawei_psirt_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -142150,10 +142152,10 @@ def index_iava_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination]: - """Return vulnerability data stored in index \"iava\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination]: + """Return vulnerability data stored in index \"huawei-psirt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` :param page: set the page number of the response :type page: int @@ -142223,7 +142225,7 @@ def index_iava_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_iava_get_serialize( + _param = self._index_huawei_psirt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -142254,7 +142256,7 @@ def index_iava_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", '404': "str", '500': "str", } @@ -142270,7 +142272,7 @@ def index_iava_get_with_http_info( @validate_call - def index_iava_get_without_preload_content( + def index_huawei_psirt_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -142308,9 +142310,9 @@ def index_iava_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"iava\" + """Return vulnerability data stored in index \"huawei-psirt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` :param page: set the page number of the response :type page: int @@ -142380,7 +142382,7 @@ def index_iava_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_iava_get_serialize( + _param = self._index_huawei_psirt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -142411,7 +142413,7 @@ def index_iava_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", '404': "str", '500': "str", } @@ -142422,7 +142424,7 @@ def index_iava_get_without_preload_content( return response_data.response - def _index_iava_get_serialize( + def _index_huawei_psirt_get_serialize( self, page, limit, @@ -142582,7 +142584,7 @@ def _index_iava_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/iava', + resource_path='/index/huawei-psirt', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -142599,7 +142601,7 @@ def _index_iava_get_serialize( @validate_call - def index_ibm_get( + def index_iava_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -142636,10 +142638,10 @@ def index_ibm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination: - """Return vulnerability data stored in index \"ibm\" + ) -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination: + """Return vulnerability data stored in index \"iava\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` :param page: set the page number of the response :type page: int @@ -142709,7 +142711,7 @@ def index_ibm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ibm_get_serialize( + _param = self._index_iava_get_serialize( page=page, limit=limit, cursor=cursor, @@ -142740,7 +142742,7 @@ def index_ibm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", '404': "str", '500': "str", } @@ -142756,7 +142758,7 @@ def index_ibm_get( @validate_call - def index_ibm_get_with_http_info( + def index_iava_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -142793,10 +142795,10 @@ def index_ibm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination]: - """Return vulnerability data stored in index \"ibm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination]: + """Return vulnerability data stored in index \"iava\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` :param page: set the page number of the response :type page: int @@ -142866,7 +142868,7 @@ def index_ibm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ibm_get_serialize( + _param = self._index_iava_get_serialize( page=page, limit=limit, cursor=cursor, @@ -142897,7 +142899,7 @@ def index_ibm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", '404': "str", '500': "str", } @@ -142913,7 +142915,7 @@ def index_ibm_get_with_http_info( @validate_call - def index_ibm_get_without_preload_content( + def index_iava_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -142951,9 +142953,9 @@ def index_ibm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ibm\" + """Return vulnerability data stored in index \"iava\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` :param page: set the page number of the response :type page: int @@ -143023,7 +143025,7 @@ def index_ibm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ibm_get_serialize( + _param = self._index_iava_get_serialize( page=page, limit=limit, cursor=cursor, @@ -143054,7 +143056,7 @@ def index_ibm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", '404': "str", '500': "str", } @@ -143065,7 +143067,7 @@ def index_ibm_get_without_preload_content( return response_data.response - def _index_ibm_get_serialize( + def _index_iava_get_serialize( self, page, limit, @@ -143225,7 +143227,7 @@ def _index_ibm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ibm', + resource_path='/index/iava', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -143242,7 +143244,7 @@ def _index_ibm_get_serialize( @validate_call - def index_idemia_get( + def index_ibm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -143279,10 +143281,10 @@ def index_idemia_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination: - """Return vulnerability data stored in index \"idemia\" + ) -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination: + """Return vulnerability data stored in index \"ibm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` :param page: set the page number of the response :type page: int @@ -143352,7 +143354,7 @@ def index_idemia_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_idemia_get_serialize( + _param = self._index_ibm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -143383,7 +143385,7 @@ def index_idemia_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", '404': "str", '500': "str", } @@ -143399,7 +143401,7 @@ def index_idemia_get( @validate_call - def index_idemia_get_with_http_info( + def index_ibm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -143436,10 +143438,10 @@ def index_idemia_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination]: - """Return vulnerability data stored in index \"idemia\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination]: + """Return vulnerability data stored in index \"ibm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` :param page: set the page number of the response :type page: int @@ -143509,7 +143511,7 @@ def index_idemia_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_idemia_get_serialize( + _param = self._index_ibm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -143540,7 +143542,7 @@ def index_idemia_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", '404': "str", '500': "str", } @@ -143556,7 +143558,7 @@ def index_idemia_get_with_http_info( @validate_call - def index_idemia_get_without_preload_content( + def index_ibm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -143594,9 +143596,9 @@ def index_idemia_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"idemia\" + """Return vulnerability data stored in index \"ibm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` :param page: set the page number of the response :type page: int @@ -143666,7 +143668,7 @@ def index_idemia_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_idemia_get_serialize( + _param = self._index_ibm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -143697,7 +143699,7 @@ def index_idemia_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", '404': "str", '500': "str", } @@ -143708,7 +143710,7 @@ def index_idemia_get_without_preload_content( return response_data.response - def _index_idemia_get_serialize( + def _index_ibm_get_serialize( self, page, limit, @@ -143868,7 +143870,7 @@ def _index_idemia_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/idemia', + resource_path='/index/ibm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -143885,7 +143887,7 @@ def _index_idemia_get_serialize( @validate_call - def index_igel_get( + def index_idemia_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -143922,10 +143924,10 @@ def index_igel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination: - """Return vulnerability data stored in index \"igel\" + ) -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination: + """Return vulnerability data stored in index \"idemia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` :param page: set the page number of the response :type page: int @@ -143995,7 +143997,7 @@ def index_igel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_igel_get_serialize( + _param = self._index_idemia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144026,7 +144028,7 @@ def index_igel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", '404': "str", '500': "str", } @@ -144042,7 +144044,7 @@ def index_igel_get( @validate_call - def index_igel_get_with_http_info( + def index_idemia_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144079,10 +144081,10 @@ def index_igel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination]: - """Return vulnerability data stored in index \"igel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination]: + """Return vulnerability data stored in index \"idemia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` :param page: set the page number of the response :type page: int @@ -144152,7 +144154,7 @@ def index_igel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_igel_get_serialize( + _param = self._index_idemia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144183,7 +144185,7 @@ def index_igel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", '404': "str", '500': "str", } @@ -144199,7 +144201,7 @@ def index_igel_get_with_http_info( @validate_call - def index_igel_get_without_preload_content( + def index_idemia_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144237,9 +144239,9 @@ def index_igel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"igel\" + """Return vulnerability data stored in index \"idemia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` :param page: set the page number of the response :type page: int @@ -144309,7 +144311,7 @@ def index_igel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_igel_get_serialize( + _param = self._index_idemia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144340,7 +144342,7 @@ def index_igel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", '404': "str", '500': "str", } @@ -144351,7 +144353,7 @@ def index_igel_get_without_preload_content( return response_data.response - def _index_igel_get_serialize( + def _index_idemia_get_serialize( self, page, limit, @@ -144511,7 +144513,7 @@ def _index_igel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/igel', + resource_path='/index/idemia', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -144528,7 +144530,7 @@ def _index_igel_get_serialize( @validate_call - def index_il_alerts_get( + def index_igel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144565,10 +144567,10 @@ def index_il_alerts_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination: - """Return vulnerability data stored in index \"il-alerts\" + ) -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination: + """Return vulnerability data stored in index \"igel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` :param page: set the page number of the response :type page: int @@ -144638,7 +144640,7 @@ def index_il_alerts_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_alerts_get_serialize( + _param = self._index_igel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144669,7 +144671,7 @@ def index_il_alerts_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", '404': "str", '500': "str", } @@ -144685,7 +144687,7 @@ def index_il_alerts_get( @validate_call - def index_il_alerts_get_with_http_info( + def index_igel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144722,10 +144724,10 @@ def index_il_alerts_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination]: - """Return vulnerability data stored in index \"il-alerts\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination]: + """Return vulnerability data stored in index \"igel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` :param page: set the page number of the response :type page: int @@ -144795,7 +144797,7 @@ def index_il_alerts_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_alerts_get_serialize( + _param = self._index_igel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144826,7 +144828,7 @@ def index_il_alerts_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", '404': "str", '500': "str", } @@ -144842,7 +144844,7 @@ def index_il_alerts_get_with_http_info( @validate_call - def index_il_alerts_get_without_preload_content( + def index_igel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144880,9 +144882,9 @@ def index_il_alerts_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"il-alerts\" + """Return vulnerability data stored in index \"igel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` :param page: set the page number of the response :type page: int @@ -144952,7 +144954,7 @@ def index_il_alerts_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_alerts_get_serialize( + _param = self._index_igel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144983,7 +144985,7 @@ def index_il_alerts_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", '404': "str", '500': "str", } @@ -144994,7 +144996,7 @@ def index_il_alerts_get_without_preload_content( return response_data.response - def _index_il_alerts_get_serialize( + def _index_igel_get_serialize( self, page, limit, @@ -145154,7 +145156,7 @@ def _index_il_alerts_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/il-alerts', + resource_path='/index/igel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -145171,7 +145173,7 @@ def _index_il_alerts_get_serialize( @validate_call - def index_il_vulnerabilities_get( + def index_il_alerts_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145208,10 +145210,10 @@ def index_il_vulnerabilities_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination: - """Return vulnerability data stored in index \"il-vulnerabilities\" + ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination: + """Return vulnerability data stored in index \"il-alerts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` :param page: set the page number of the response :type page: int @@ -145281,7 +145283,7 @@ def index_il_vulnerabilities_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_vulnerabilities_get_serialize( + _param = self._index_il_alerts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145312,7 +145314,7 @@ def index_il_vulnerabilities_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", '404': "str", '500': "str", } @@ -145328,7 +145330,7 @@ def index_il_vulnerabilities_get( @validate_call - def index_il_vulnerabilities_get_with_http_info( + def index_il_alerts_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145365,10 +145367,10 @@ def index_il_vulnerabilities_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination]: - """Return vulnerability data stored in index \"il-vulnerabilities\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination]: + """Return vulnerability data stored in index \"il-alerts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` :param page: set the page number of the response :type page: int @@ -145438,7 +145440,7 @@ def index_il_vulnerabilities_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_vulnerabilities_get_serialize( + _param = self._index_il_alerts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145469,7 +145471,7 @@ def index_il_vulnerabilities_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", '404': "str", '500': "str", } @@ -145485,7 +145487,7 @@ def index_il_vulnerabilities_get_with_http_info( @validate_call - def index_il_vulnerabilities_get_without_preload_content( + def index_il_alerts_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145523,9 +145525,9 @@ def index_il_vulnerabilities_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"il-vulnerabilities\" + """Return vulnerability data stored in index \"il-alerts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` :param page: set the page number of the response :type page: int @@ -145595,7 +145597,7 @@ def index_il_vulnerabilities_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_vulnerabilities_get_serialize( + _param = self._index_il_alerts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145626,7 +145628,7 @@ def index_il_vulnerabilities_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", '404': "str", '500': "str", } @@ -145637,7 +145639,7 @@ def index_il_vulnerabilities_get_without_preload_content( return response_data.response - def _index_il_vulnerabilities_get_serialize( + def _index_il_alerts_get_serialize( self, page, limit, @@ -145797,7 +145799,7 @@ def _index_il_vulnerabilities_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/il-vulnerabilities', + resource_path='/index/il-alerts', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -145814,7 +145816,7 @@ def _index_il_vulnerabilities_get_serialize( @validate_call - def index_incibe_get( + def index_il_vulnerabilities_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145851,10 +145853,10 @@ def index_incibe_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"incibe\" + ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination: + """Return vulnerability data stored in index \"il-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -145924,7 +145926,7 @@ def index_incibe_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_incibe_get_serialize( + _param = self._index_il_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145955,7 +145957,7 @@ def index_incibe_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -145971,7 +145973,7 @@ def index_incibe_get( @validate_call - def index_incibe_get_with_http_info( + def index_il_vulnerabilities_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146008,10 +146010,10 @@ def index_incibe_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"incibe\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination]: + """Return vulnerability data stored in index \"il-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -146081,7 +146083,7 @@ def index_incibe_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_incibe_get_serialize( + _param = self._index_il_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146112,7 +146114,7 @@ def index_incibe_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -146128,7 +146130,7 @@ def index_incibe_get_with_http_info( @validate_call - def index_incibe_get_without_preload_content( + def index_il_vulnerabilities_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146166,9 +146168,9 @@ def index_incibe_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"incibe\" + """Return vulnerability data stored in index \"il-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -146238,7 +146240,7 @@ def index_incibe_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_incibe_get_serialize( + _param = self._index_il_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146269,7 +146271,7 @@ def index_incibe_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -146280,7 +146282,7 @@ def index_incibe_get_without_preload_content( return response_data.response - def _index_incibe_get_serialize( + def _index_il_vulnerabilities_get_serialize( self, page, limit, @@ -146440,7 +146442,7 @@ def _index_incibe_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/incibe', + resource_path='/index/il-vulnerabilities', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -146457,7 +146459,7 @@ def _index_incibe_get_serialize( @validate_call - def index_initial_access_get( + def index_incibe_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146494,10 +146496,10 @@ def index_initial_access_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: - """Return vulnerability data stored in index \"initial-access\" + ) -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"incibe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` :param page: set the page number of the response :type page: int @@ -146567,7 +146569,7 @@ def index_initial_access_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_get_serialize( + _param = self._index_incibe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146598,7 +146600,7 @@ def index_initial_access_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -146614,7 +146616,7 @@ def index_initial_access_get( @validate_call - def index_initial_access_get_with_http_info( + def index_incibe_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146651,10 +146653,10 @@ def index_initial_access_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: - """Return vulnerability data stored in index \"initial-access\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"incibe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` :param page: set the page number of the response :type page: int @@ -146724,7 +146726,7 @@ def index_initial_access_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_get_serialize( + _param = self._index_incibe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146755,7 +146757,7 @@ def index_initial_access_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -146771,7 +146773,7 @@ def index_initial_access_get_with_http_info( @validate_call - def index_initial_access_get_without_preload_content( + def index_incibe_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146809,9 +146811,9 @@ def index_initial_access_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"initial-access\" + """Return vulnerability data stored in index \"incibe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` :param page: set the page number of the response :type page: int @@ -146881,7 +146883,7 @@ def index_initial_access_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_get_serialize( + _param = self._index_incibe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146912,7 +146914,7 @@ def index_initial_access_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -146923,7 +146925,7 @@ def index_initial_access_get_without_preload_content( return response_data.response - def _index_initial_access_get_serialize( + def _index_incibe_get_serialize( self, page, limit, @@ -147083,7 +147085,7 @@ def _index_initial_access_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/initial-access', + resource_path='/index/incibe', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -147100,7 +147102,7 @@ def _index_initial_access_get_serialize( @validate_call - def index_initial_access_git_get( + def index_initial_access_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147138,9 +147140,9 @@ def index_initial_access_git_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: - """Return vulnerability data stored in index \"initial-access-git\" + """Return vulnerability data stored in index \"initial-access\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` :param page: set the page number of the response :type page: int @@ -147210,7 +147212,7 @@ def index_initial_access_git_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_git_get_serialize( + _param = self._index_initial_access_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147257,7 +147259,7 @@ def index_initial_access_git_get( @validate_call - def index_initial_access_git_get_with_http_info( + def index_initial_access_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147295,9 +147297,9 @@ def index_initial_access_git_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: - """Return vulnerability data stored in index \"initial-access-git\" + """Return vulnerability data stored in index \"initial-access\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` :param page: set the page number of the response :type page: int @@ -147367,7 +147369,7 @@ def index_initial_access_git_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_git_get_serialize( + _param = self._index_initial_access_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147414,7 +147416,7 @@ def index_initial_access_git_get_with_http_info( @validate_call - def index_initial_access_git_get_without_preload_content( + def index_initial_access_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147452,9 +147454,9 @@ def index_initial_access_git_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"initial-access-git\" + """Return vulnerability data stored in index \"initial-access\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` :param page: set the page number of the response :type page: int @@ -147524,7 +147526,7 @@ def index_initial_access_git_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_git_get_serialize( + _param = self._index_initial_access_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147566,7 +147568,7 @@ def index_initial_access_git_get_without_preload_content( return response_data.response - def _index_initial_access_git_get_serialize( + def _index_initial_access_get_serialize( self, page, limit, @@ -147726,7 +147728,7 @@ def _index_initial_access_git_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/initial-access-git', + resource_path='/index/initial-access', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -147743,7 +147745,7 @@ def _index_initial_access_git_get_serialize( @validate_call - def index_intel_get( + def index_initial_access_git_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147780,10 +147782,10 @@ def index_intel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination: - """Return vulnerability data stored in index \"intel\" + ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: + """Return vulnerability data stored in index \"initial-access-git\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` :param page: set the page number of the response :type page: int @@ -147853,7 +147855,7 @@ def index_intel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_intel_get_serialize( + _param = self._index_initial_access_git_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147884,7 +147886,7 @@ def index_intel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -147900,7 +147902,7 @@ def index_intel_get( @validate_call - def index_intel_get_with_http_info( + def index_initial_access_git_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147937,10 +147939,10 @@ def index_intel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination]: - """Return vulnerability data stored in index \"intel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: + """Return vulnerability data stored in index \"initial-access-git\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` :param page: set the page number of the response :type page: int @@ -148010,7 +148012,7 @@ def index_intel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_intel_get_serialize( + _param = self._index_initial_access_git_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148041,7 +148043,7 @@ def index_intel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -148057,7 +148059,7 @@ def index_intel_get_with_http_info( @validate_call - def index_intel_get_without_preload_content( + def index_initial_access_git_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148095,9 +148097,9 @@ def index_intel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"intel\" + """Return vulnerability data stored in index \"initial-access-git\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` :param page: set the page number of the response :type page: int @@ -148167,7 +148169,7 @@ def index_intel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_intel_get_serialize( + _param = self._index_initial_access_git_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148198,7 +148200,7 @@ def index_intel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -148209,7 +148211,7 @@ def index_intel_get_without_preload_content( return response_data.response - def _index_intel_get_serialize( + def _index_initial_access_git_get_serialize( self, page, limit, @@ -148369,7 +148371,7 @@ def _index_intel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/intel', + resource_path='/index/initial-access-git', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -148386,7 +148388,7 @@ def _index_intel_get_serialize( @validate_call - def index_ipintel10d_get( + def index_intel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148395,19 +148397,14 @@ def index_ipintel10d_get( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, @@ -148428,10 +148425,10 @@ def index_ipintel10d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-10d\" + ) -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination: + """Return vulnerability data stored in index \"intel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` :param page: set the page number of the response :type page: int @@ -148447,6 +148444,10 @@ def index_ipintel10d_get( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -148457,22 +148458,165 @@ def index_ipintel10d_get( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_intel_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_intel_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination]: + """Return vulnerability data stored in index \"intel\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str :param var_date: Specify a starting published date to filter with. :type var_date: str :param var_date2: Specify an ending published date to filter with. @@ -148511,184 +148655,7 @@ def index_ipintel10d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel10d_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - cve=cve, - alias=alias, - iava=iava, - threat_actor=threat_actor, - mitre_id=mitre_id, - misp_id=misp_id, - ransomware=ransomware, - botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, - var_date=var_date, - var_date2=var_date2, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", - '404': "str", - '500': "str", - } - response_data = self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - response_data.read() - return self.api_client.response_deserialize( - response_data=response_data, - response_types_map=_response_types_map, - ).data - - - @validate_call - def index_ipintel10d_get_with_http_info( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, - iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, - mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, - misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, - ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, - botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-10d\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param alias: Specify a vulnerability alias to search with. - :type alias: str - :param iava: Specify an IAVA ID to search with. - :type iava: str - :param threat_actor: Specify a threat actor name to search with. - :type threat_actor: str - :param mitre_id: Specify a MITRE ID to search with. - :type mitre_id: str - :param misp_id: Specify a MISP ID to search with. - :type misp_id: str - :param ransomware: Specify a ransomeware family name to search with. - :type ransomware: str - :param botnet: Specify a botnet name to search with. - :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_ipintel10d_get_serialize( + _param = self._index_intel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148696,19 +148663,14 @@ def index_ipintel10d_get_with_http_info( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, @@ -148724,7 +148686,7 @@ def index_ipintel10d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", '404': "str", '500': "str", } @@ -148740,7 +148702,7 @@ def index_ipintel10d_get_with_http_info( @validate_call - def index_ipintel10d_get_without_preload_content( + def index_intel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148749,19 +148711,14 @@ def index_ipintel10d_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, @@ -148783,9 +148740,9 @@ def index_ipintel10d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-10d\" + """Return vulnerability data stored in index \"intel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` :param page: set the page number of the response :type page: int @@ -148801,6 +148758,10 @@ def index_ipintel10d_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -148811,22 +148772,8 @@ def index_ipintel10d_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param var_date: Specify a starting published date to filter with. :type var_date: str :param var_date2: Specify an ending published date to filter with. @@ -148865,7 +148812,7 @@ def index_ipintel10d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel10d_get_serialize( + _param = self._index_intel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148873,19 +148820,14 @@ def index_ipintel10d_get_without_preload_content( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, @@ -148901,7 +148843,7 @@ def index_ipintel10d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", '404': "str", '500': "str", } @@ -148912,7 +148854,7 @@ def index_ipintel10d_get_without_preload_content( return response_data.response - def _index_ipintel10d_get_serialize( + def _index_intel_get_serialize( self, page, limit, @@ -148921,19 +148863,14 @@ def _index_ipintel10d_get_serialize( cve, alias, iava, + jvndb, + ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - cidr, - asn, - country, - country_code, - id, - kind, - hostname, - matches, + published, var_date, var_date2, updated_at_start_date, @@ -148992,6 +148929,14 @@ def _index_ipintel10d_get_serialize( _query_params.append(('iava', iava)) + if jvndb is not None: + + _query_params.append(('jvndb', jvndb)) + + if ilvn is not None: + + _query_params.append(('ilvn', ilvn)) + if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -149012,37 +148957,9 @@ def _index_ipintel10d_get_serialize( _query_params.append(('botnet', botnet)) - if cidr is not None: - - _query_params.append(('cidr', cidr)) - - if asn is not None: - - _query_params.append(('asn', asn)) - - if country is not None: - - _query_params.append(('country', country)) - - if country_code is not None: - - _query_params.append(('country_code', country_code)) - - if id is not None: - - _query_params.append(('id', id)) - - if kind is not None: - - _query_params.append(('kind', kind)) - - if hostname is not None: - - _query_params.append(('hostname', hostname)) - - if matches is not None: + if published is not None: - _query_params.append(('matches', matches)) + _query_params.append(('published', published)) if var_date is not None: @@ -149097,7 +149014,7 @@ def _index_ipintel10d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ipintel-10d', + resource_path='/index/intel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -149114,7 +149031,7 @@ def _index_ipintel10d_get_serialize( @validate_call - def index_ipintel30d_get( + def index_ipintel10d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149157,9 +149074,9 @@ def index_ipintel30d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-30d\" + """Return vulnerability data stored in index \"ipintel-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` :param page: set the page number of the response :type page: int @@ -149239,7 +149156,7 @@ def index_ipintel30d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel30d_get_serialize( + _param = self._index_ipintel10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149291,7 +149208,7 @@ def index_ipintel30d_get( @validate_call - def index_ipintel30d_get_with_http_info( + def index_ipintel10d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149334,9 +149251,9 @@ def index_ipintel30d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-30d\" + """Return vulnerability data stored in index \"ipintel-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` :param page: set the page number of the response :type page: int @@ -149416,7 +149333,7 @@ def index_ipintel30d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel30d_get_serialize( + _param = self._index_ipintel10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149468,7 +149385,7 @@ def index_ipintel30d_get_with_http_info( @validate_call - def index_ipintel30d_get_without_preload_content( + def index_ipintel10d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149511,9 +149428,9 @@ def index_ipintel30d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-30d\" + """Return vulnerability data stored in index \"ipintel-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` :param page: set the page number of the response :type page: int @@ -149593,7 +149510,7 @@ def index_ipintel30d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel30d_get_serialize( + _param = self._index_ipintel10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149640,7 +149557,7 @@ def index_ipintel30d_get_without_preload_content( return response_data.response - def _index_ipintel30d_get_serialize( + def _index_ipintel10d_get_serialize( self, page, limit, @@ -149825,7 +149742,7 @@ def _index_ipintel30d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ipintel-30d', + resource_path='/index/ipintel-10d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -149842,7 +149759,7 @@ def _index_ipintel30d_get_serialize( @validate_call - def index_ipintel3d_get( + def index_ipintel30d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149885,9 +149802,9 @@ def index_ipintel3d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-3d\" + """Return vulnerability data stored in index \"ipintel-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` :param page: set the page number of the response :type page: int @@ -149967,7 +149884,7 @@ def index_ipintel3d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel3d_get_serialize( + _param = self._index_ipintel30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150019,7 +149936,7 @@ def index_ipintel3d_get( @validate_call - def index_ipintel3d_get_with_http_info( + def index_ipintel30d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150062,9 +149979,9 @@ def index_ipintel3d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-3d\" + """Return vulnerability data stored in index \"ipintel-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` :param page: set the page number of the response :type page: int @@ -150144,7 +150061,7 @@ def index_ipintel3d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel3d_get_serialize( + _param = self._index_ipintel30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150196,7 +150113,735 @@ def index_ipintel3d_get_with_http_info( @validate_call - def index_ipintel3d_get_without_preload_content( + def index_ipintel30d_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"ipintel-30d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_ipintel30d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_ipintel30d_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + cve, + alias, + iava, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, + cidr, + asn, + country, + country_code, + id, + kind, + hostname, + matches, + var_date, + var_date2, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _host = None + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if alias is not None: + + _query_params.append(('alias', alias)) + + if iava is not None: + + _query_params.append(('iava', iava)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if cidr is not None: + + _query_params.append(('cidr', cidr)) + + if asn is not None: + + _query_params.append(('asn', asn)) + + if country is not None: + + _query_params.append(('country', country)) + + if country_code is not None: + + _query_params.append(('country_code', country_code)) + + if id is not None: + + _query_params.append(('id', id)) + + if kind is not None: + + _query_params.append(('kind', kind)) + + if hostname is not None: + + _query_params.append(('hostname', hostname)) + + if matches is not None: + + _query_params.append(('matches', matches)) + + if var_date is not None: + + _query_params.append(('date', var_date)) + + if var_date2 is not None: + + _query_params.append(('date', var_date2)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/index/ipintel-30d', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + def index_ipintel3d_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: + """Return vulnerability data stored in index \"ipintel-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_ipintel3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_ipintel3d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: + """Return vulnerability data stored in index \"ipintel-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_ipintel3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + def index_ipintel3d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150695,7 +151340,720 @@ def index_ipintel90d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel90d_get_serialize( + _param = self._index_ipintel90d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_ipintel90d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: + """Return vulnerability data stored in index \"ipintel-90d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_ipintel90d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + def index_ipintel90d_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"ipintel-90d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_ipintel90d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_ipintel90d_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + cve, + alias, + iava, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, + cidr, + asn, + country, + country_code, + id, + kind, + hostname, + matches, + var_date, + var_date2, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _host = None + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if alias is not None: + + _query_params.append(('alias', alias)) + + if iava is not None: + + _query_params.append(('iava', iava)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if cidr is not None: + + _query_params.append(('cidr', cidr)) + + if asn is not None: + + _query_params.append(('asn', asn)) + + if country is not None: + + _query_params.append(('country', country)) + + if country_code is not None: + + _query_params.append(('country_code', country_code)) + + if id is not None: + + _query_params.append(('id', id)) + + if kind is not None: + + _query_params.append(('kind', kind)) + + if hostname is not None: + + _query_params.append(('hostname', hostname)) + + if matches is not None: + + _query_params.append(('matches', matches)) + + if var_date is not None: + + _query_params.append(('date', var_date)) + + if var_date2 is not None: + + _query_params.append(('date', var_date2)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/index/ipintel-90d', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + def index_istio_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination: + """Return vulnerability data stored in index \"istio\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_istio_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150703,19 +152061,14 @@ def index_ipintel90d_get( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, @@ -150731,7 +152084,7 @@ def index_ipintel90d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", '404': "str", '500': "str", } @@ -150747,7 +152100,7 @@ def index_ipintel90d_get( @validate_call - def index_ipintel90d_get_with_http_info( + def index_istio_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150756,19 +152109,14 @@ def index_ipintel90d_get_with_http_info( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, @@ -150789,10 +152137,10 @@ def index_ipintel90d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-90d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination]: + """Return vulnerability data stored in index \"istio\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` :param page: set the page number of the response :type page: int @@ -150808,6 +152156,10 @@ def index_ipintel90d_get_with_http_info( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -150818,22 +152170,8 @@ def index_ipintel90d_get_with_http_info( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param var_date: Specify a starting published date to filter with. :type var_date: str :param var_date2: Specify an ending published date to filter with. @@ -150872,7 +152210,7 @@ def index_ipintel90d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel90d_get_serialize( + _param = self._index_istio_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150880,19 +152218,14 @@ def index_ipintel90d_get_with_http_info( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, @@ -150908,7 +152241,7 @@ def index_ipintel90d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", '404': "str", '500': "str", } @@ -150924,7 +152257,7 @@ def index_ipintel90d_get_with_http_info( @validate_call - def index_ipintel90d_get_without_preload_content( + def index_istio_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150933,19 +152266,14 @@ def index_ipintel90d_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, @@ -150967,9 +152295,9 @@ def index_ipintel90d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-90d\" + """Return vulnerability data stored in index \"istio\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` :param page: set the page number of the response :type page: int @@ -150985,6 +152313,10 @@ def index_ipintel90d_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -150995,22 +152327,8 @@ def index_ipintel90d_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param var_date: Specify a starting published date to filter with. :type var_date: str :param var_date2: Specify an ending published date to filter with. @@ -151049,7 +152367,7 @@ def index_ipintel90d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel90d_get_serialize( + _param = self._index_istio_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151057,19 +152375,14 @@ def index_ipintel90d_get_without_preload_content( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, @@ -151085,7 +152398,7 @@ def index_ipintel90d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", '404': "str", '500': "str", } @@ -151096,7 +152409,7 @@ def index_ipintel90d_get_without_preload_content( return response_data.response - def _index_ipintel90d_get_serialize( + def _index_istio_get_serialize( self, page, limit, @@ -151105,19 +152418,14 @@ def _index_ipintel90d_get_serialize( cve, alias, iava, + jvndb, + ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - cidr, - asn, - country, - country_code, - id, - kind, - hostname, - matches, + published, var_date, var_date2, updated_at_start_date, @@ -151176,6 +152484,14 @@ def _index_ipintel90d_get_serialize( _query_params.append(('iava', iava)) + if jvndb is not None: + + _query_params.append(('jvndb', jvndb)) + + if ilvn is not None: + + _query_params.append(('ilvn', ilvn)) + if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -151196,37 +152512,9 @@ def _index_ipintel90d_get_serialize( _query_params.append(('botnet', botnet)) - if cidr is not None: - - _query_params.append(('cidr', cidr)) - - if asn is not None: - - _query_params.append(('asn', asn)) - - if country is not None: - - _query_params.append(('country', country)) - - if country_code is not None: - - _query_params.append(('country_code', country_code)) - - if id is not None: - - _query_params.append(('id', id)) - - if kind is not None: - - _query_params.append(('kind', kind)) - - if hostname is not None: - - _query_params.append(('hostname', hostname)) - - if matches is not None: + if published is not None: - _query_params.append(('matches', matches)) + _query_params.append(('published', published)) if var_date is not None: @@ -151281,7 +152569,7 @@ def _index_ipintel90d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ipintel-90d', + resource_path='/index/istio', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -151298,7 +152586,7 @@ def _index_ipintel90d_get_serialize( @validate_call - def index_istio_get( + def index_ivanti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151335,10 +152623,10 @@ def index_istio_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination: - """Return vulnerability data stored in index \"istio\" + ) -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination: + """Return vulnerability data stored in index \"ivanti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` :param page: set the page number of the response :type page: int @@ -151408,7 +152696,7 @@ def index_istio_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_istio_get_serialize( + _param = self._index_ivanti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151439,7 +152727,7 @@ def index_istio_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", '404': "str", '500': "str", } @@ -151455,7 +152743,7 @@ def index_istio_get( @validate_call - def index_istio_get_with_http_info( + def index_ivanti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151492,10 +152780,10 @@ def index_istio_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination]: - """Return vulnerability data stored in index \"istio\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination]: + """Return vulnerability data stored in index \"ivanti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` :param page: set the page number of the response :type page: int @@ -151565,7 +152853,7 @@ def index_istio_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_istio_get_serialize( + _param = self._index_ivanti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151596,7 +152884,7 @@ def index_istio_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", '404': "str", '500': "str", } @@ -151612,7 +152900,7 @@ def index_istio_get_with_http_info( @validate_call - def index_istio_get_without_preload_content( + def index_ivanti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151650,9 +152938,9 @@ def index_istio_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"istio\" + """Return vulnerability data stored in index \"ivanti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` :param page: set the page number of the response :type page: int @@ -151722,7 +153010,7 @@ def index_istio_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_istio_get_serialize( + _param = self._index_ivanti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151753,7 +153041,7 @@ def index_istio_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", '404': "str", '500': "str", } @@ -151764,7 +153052,7 @@ def index_istio_get_without_preload_content( return response_data.response - def _index_istio_get_serialize( + def _index_ivanti_get_serialize( self, page, limit, @@ -151924,7 +153212,7 @@ def _index_istio_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/istio', + resource_path='/index/ivanti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -151941,7 +153229,7 @@ def _index_istio_get_serialize( @validate_call - def index_ivanti_get( + def index_ivanti_rss_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151978,10 +153266,10 @@ def index_ivanti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination: - """Return vulnerability data stored in index \"ivanti\" + ) -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination: + """Return vulnerability data stored in index \"ivanti-rss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` :param page: set the page number of the response :type page: int @@ -152051,7 +153339,7 @@ def index_ivanti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_get_serialize( + _param = self._index_ivanti_rss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152082,7 +153370,7 @@ def index_ivanti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", '404': "str", '500': "str", } @@ -152098,7 +153386,7 @@ def index_ivanti_get( @validate_call - def index_ivanti_get_with_http_info( + def index_ivanti_rss_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152135,10 +153423,10 @@ def index_ivanti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination]: - """Return vulnerability data stored in index \"ivanti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination]: + """Return vulnerability data stored in index \"ivanti-rss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` :param page: set the page number of the response :type page: int @@ -152208,7 +153496,7 @@ def index_ivanti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_get_serialize( + _param = self._index_ivanti_rss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152239,7 +153527,7 @@ def index_ivanti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", '404': "str", '500': "str", } @@ -152255,7 +153543,7 @@ def index_ivanti_get_with_http_info( @validate_call - def index_ivanti_get_without_preload_content( + def index_ivanti_rss_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152293,9 +153581,9 @@ def index_ivanti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ivanti\" + """Return vulnerability data stored in index \"ivanti-rss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` :param page: set the page number of the response :type page: int @@ -152365,7 +153653,7 @@ def index_ivanti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_get_serialize( + _param = self._index_ivanti_rss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152396,7 +153684,7 @@ def index_ivanti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", '404': "str", '500': "str", } @@ -152407,7 +153695,7 @@ def index_ivanti_get_without_preload_content( return response_data.response - def _index_ivanti_get_serialize( + def _index_ivanti_rss_get_serialize( self, page, limit, @@ -152567,7 +153855,7 @@ def _index_ivanti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ivanti', + resource_path='/index/ivanti-rss', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -152584,7 +153872,7 @@ def _index_ivanti_get_serialize( @validate_call - def index_ivanti_rss_get( + def index_jenkins_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152621,10 +153909,10 @@ def index_ivanti_rss_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination: - """Return vulnerability data stored in index \"ivanti-rss\" + ) -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination: + """Return vulnerability data stored in index \"jenkins\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` :param page: set the page number of the response :type page: int @@ -152694,7 +153982,7 @@ def index_ivanti_rss_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_rss_get_serialize( + _param = self._index_jenkins_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152725,7 +154013,7 @@ def index_ivanti_rss_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", '404': "str", '500': "str", } @@ -152741,7 +154029,7 @@ def index_ivanti_rss_get( @validate_call - def index_ivanti_rss_get_with_http_info( + def index_jenkins_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152778,10 +154066,10 @@ def index_ivanti_rss_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination]: - """Return vulnerability data stored in index \"ivanti-rss\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination]: + """Return vulnerability data stored in index \"jenkins\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` :param page: set the page number of the response :type page: int @@ -152851,7 +154139,7 @@ def index_ivanti_rss_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_rss_get_serialize( + _param = self._index_jenkins_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152882,7 +154170,7 @@ def index_ivanti_rss_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", '404': "str", '500': "str", } @@ -152898,7 +154186,7 @@ def index_ivanti_rss_get_with_http_info( @validate_call - def index_ivanti_rss_get_without_preload_content( + def index_jenkins_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152936,9 +154224,9 @@ def index_ivanti_rss_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ivanti-rss\" + """Return vulnerability data stored in index \"jenkins\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` :param page: set the page number of the response :type page: int @@ -153008,7 +154296,7 @@ def index_ivanti_rss_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_rss_get_serialize( + _param = self._index_jenkins_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153039,7 +154327,7 @@ def index_ivanti_rss_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", '404': "str", '500': "str", } @@ -153050,7 +154338,7 @@ def index_ivanti_rss_get_without_preload_content( return response_data.response - def _index_ivanti_rss_get_serialize( + def _index_jenkins_get_serialize( self, page, limit, @@ -153210,7 +154498,7 @@ def _index_ivanti_rss_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ivanti-rss', + resource_path='/index/jenkins', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -153227,7 +154515,7 @@ def _index_ivanti_rss_get_serialize( @validate_call - def index_jenkins_get( + def index_jetbrains_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153264,10 +154552,10 @@ def index_jenkins_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination: - """Return vulnerability data stored in index \"jenkins\" + ) -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination: + """Return vulnerability data stored in index \"jetbrains\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` :param page: set the page number of the response :type page: int @@ -153337,7 +154625,7 @@ def index_jenkins_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jenkins_get_serialize( + _param = self._index_jetbrains_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153368,7 +154656,7 @@ def index_jenkins_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", '404': "str", '500': "str", } @@ -153384,7 +154672,7 @@ def index_jenkins_get( @validate_call - def index_jenkins_get_with_http_info( + def index_jetbrains_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153421,10 +154709,10 @@ def index_jenkins_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination]: - """Return vulnerability data stored in index \"jenkins\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination]: + """Return vulnerability data stored in index \"jetbrains\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` :param page: set the page number of the response :type page: int @@ -153494,7 +154782,7 @@ def index_jenkins_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jenkins_get_serialize( + _param = self._index_jetbrains_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153525,7 +154813,7 @@ def index_jenkins_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", '404': "str", '500': "str", } @@ -153541,7 +154829,7 @@ def index_jenkins_get_with_http_info( @validate_call - def index_jenkins_get_without_preload_content( + def index_jetbrains_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153579,9 +154867,9 @@ def index_jenkins_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jenkins\" + """Return vulnerability data stored in index \"jetbrains\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` :param page: set the page number of the response :type page: int @@ -153651,7 +154939,7 @@ def index_jenkins_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jenkins_get_serialize( + _param = self._index_jetbrains_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153682,7 +154970,7 @@ def index_jenkins_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", '404': "str", '500': "str", } @@ -153693,7 +154981,7 @@ def index_jenkins_get_without_preload_content( return response_data.response - def _index_jenkins_get_serialize( + def _index_jetbrains_get_serialize( self, page, limit, @@ -153853,7 +155141,7 @@ def _index_jenkins_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/jenkins', + resource_path='/index/jetbrains', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -153870,7 +155158,7 @@ def _index_jenkins_get_serialize( @validate_call - def index_jetbrains_get( + def index_jfrog_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153907,10 +155195,10 @@ def index_jetbrains_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination: - """Return vulnerability data stored in index \"jetbrains\" + ) -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination: + """Return vulnerability data stored in index \"jfrog\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` :param page: set the page number of the response :type page: int @@ -153980,7 +155268,7 @@ def index_jetbrains_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jetbrains_get_serialize( + _param = self._index_jfrog_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154011,7 +155299,7 @@ def index_jetbrains_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", '404': "str", '500': "str", } @@ -154027,7 +155315,7 @@ def index_jetbrains_get( @validate_call - def index_jetbrains_get_with_http_info( + def index_jfrog_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154064,10 +155352,10 @@ def index_jetbrains_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination]: - """Return vulnerability data stored in index \"jetbrains\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination]: + """Return vulnerability data stored in index \"jfrog\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` :param page: set the page number of the response :type page: int @@ -154137,7 +155425,7 @@ def index_jetbrains_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jetbrains_get_serialize( + _param = self._index_jfrog_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154168,7 +155456,7 @@ def index_jetbrains_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", '404': "str", '500': "str", } @@ -154184,7 +155472,7 @@ def index_jetbrains_get_with_http_info( @validate_call - def index_jetbrains_get_without_preload_content( + def index_jfrog_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154222,9 +155510,9 @@ def index_jetbrains_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jetbrains\" + """Return vulnerability data stored in index \"jfrog\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` :param page: set the page number of the response :type page: int @@ -154294,7 +155582,7 @@ def index_jetbrains_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jetbrains_get_serialize( + _param = self._index_jfrog_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154325,7 +155613,7 @@ def index_jetbrains_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", '404': "str", '500': "str", } @@ -154336,7 +155624,7 @@ def index_jetbrains_get_without_preload_content( return response_data.response - def _index_jetbrains_get_serialize( + def _index_jfrog_get_serialize( self, page, limit, @@ -154496,7 +155784,7 @@ def _index_jetbrains_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/jetbrains', + resource_path='/index/jfrog', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -154513,7 +155801,7 @@ def _index_jetbrains_get_serialize( @validate_call - def index_jfrog_get( + def index_jnj_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154550,10 +155838,10 @@ def index_jfrog_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination: - """Return vulnerability data stored in index \"jfrog\" + ) -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"jnj\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` :param page: set the page number of the response :type page: int @@ -154623,7 +155911,7 @@ def index_jfrog_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jfrog_get_serialize( + _param = self._index_jnj_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154654,7 +155942,7 @@ def index_jfrog_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -154670,7 +155958,7 @@ def index_jfrog_get( @validate_call - def index_jfrog_get_with_http_info( + def index_jnj_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154707,10 +155995,10 @@ def index_jfrog_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination]: - """Return vulnerability data stored in index \"jfrog\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"jnj\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` :param page: set the page number of the response :type page: int @@ -154780,7 +156068,7 @@ def index_jfrog_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jfrog_get_serialize( + _param = self._index_jnj_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154811,7 +156099,7 @@ def index_jfrog_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -154827,7 +156115,7 @@ def index_jfrog_get_with_http_info( @validate_call - def index_jfrog_get_without_preload_content( + def index_jnj_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154865,9 +156153,9 @@ def index_jfrog_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jfrog\" + """Return vulnerability data stored in index \"jnj\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` :param page: set the page number of the response :type page: int @@ -154937,7 +156225,7 @@ def index_jfrog_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jfrog_get_serialize( + _param = self._index_jnj_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154968,7 +156256,7 @@ def index_jfrog_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -154979,7 +156267,7 @@ def index_jfrog_get_without_preload_content( return response_data.response - def _index_jfrog_get_serialize( + def _index_jnj_get_serialize( self, page, limit, @@ -155139,7 +156427,7 @@ def _index_jfrog_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/jfrog', + resource_path='/index/jnj', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -155156,7 +156444,7 @@ def _index_jfrog_get_serialize( @validate_call - def index_jnj_get( + def index_johnson_controls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155193,10 +156481,10 @@ def index_jnj_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"jnj\" + ) -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination: + """Return vulnerability data stored in index \"johnson-controls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` :param page: set the page number of the response :type page: int @@ -155266,7 +156554,7 @@ def index_jnj_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jnj_get_serialize( + _param = self._index_johnson_controls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155297,7 +156585,7 @@ def index_jnj_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", '404': "str", '500': "str", } @@ -155313,7 +156601,7 @@ def index_jnj_get( @validate_call - def index_jnj_get_with_http_info( + def index_johnson_controls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155350,10 +156638,10 @@ def index_jnj_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"jnj\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination]: + """Return vulnerability data stored in index \"johnson-controls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` :param page: set the page number of the response :type page: int @@ -155423,7 +156711,7 @@ def index_jnj_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jnj_get_serialize( + _param = self._index_johnson_controls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155454,7 +156742,7 @@ def index_jnj_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", '404': "str", '500': "str", } @@ -155470,7 +156758,7 @@ def index_jnj_get_with_http_info( @validate_call - def index_jnj_get_without_preload_content( + def index_johnson_controls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155508,9 +156796,9 @@ def index_jnj_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jnj\" + """Return vulnerability data stored in index \"johnson-controls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` :param page: set the page number of the response :type page: int @@ -155580,7 +156868,7 @@ def index_jnj_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jnj_get_serialize( + _param = self._index_johnson_controls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155611,7 +156899,7 @@ def index_jnj_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", '404': "str", '500': "str", } @@ -155622,7 +156910,7 @@ def index_jnj_get_without_preload_content( return response_data.response - def _index_jnj_get_serialize( + def _index_johnson_controls_get_serialize( self, page, limit, @@ -155782,7 +157070,7 @@ def _index_jnj_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/jnj', + resource_path='/index/johnson-controls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -155799,7 +157087,7 @@ def _index_jnj_get_serialize( @validate_call - def index_johnson_controls_get( + def index_juniper_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155836,10 +157124,10 @@ def index_johnson_controls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination: - """Return vulnerability data stored in index \"johnson-controls\" + ) -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination: + """Return vulnerability data stored in index \"juniper\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` :param page: set the page number of the response :type page: int @@ -155909,7 +157197,7 @@ def index_johnson_controls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_johnson_controls_get_serialize( + _param = self._index_juniper_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155940,7 +157228,7 @@ def index_johnson_controls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", '404': "str", '500': "str", } @@ -155956,7 +157244,7 @@ def index_johnson_controls_get( @validate_call - def index_johnson_controls_get_with_http_info( + def index_juniper_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155993,10 +157281,10 @@ def index_johnson_controls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination]: - """Return vulnerability data stored in index \"johnson-controls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination]: + """Return vulnerability data stored in index \"juniper\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` :param page: set the page number of the response :type page: int @@ -156066,7 +157354,7 @@ def index_johnson_controls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_johnson_controls_get_serialize( + _param = self._index_juniper_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156097,7 +157385,7 @@ def index_johnson_controls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", '404': "str", '500': "str", } @@ -156113,7 +157401,7 @@ def index_johnson_controls_get_with_http_info( @validate_call - def index_johnson_controls_get_without_preload_content( + def index_juniper_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156151,9 +157439,9 @@ def index_johnson_controls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"johnson-controls\" + """Return vulnerability data stored in index \"juniper\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` :param page: set the page number of the response :type page: int @@ -156223,7 +157511,7 @@ def index_johnson_controls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_johnson_controls_get_serialize( + _param = self._index_juniper_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156254,7 +157542,7 @@ def index_johnson_controls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", '404': "str", '500': "str", } @@ -156265,7 +157553,7 @@ def index_johnson_controls_get_without_preload_content( return response_data.response - def _index_johnson_controls_get_serialize( + def _index_juniper_get_serialize( self, page, limit, @@ -156425,7 +157713,7 @@ def _index_johnson_controls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/johnson-controls', + resource_path='/index/juniper', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -156442,7 +157730,7 @@ def _index_johnson_controls_get_serialize( @validate_call - def index_juniper_get( + def index_jvn_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156479,10 +157767,10 @@ def index_juniper_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination: - """Return vulnerability data stored in index \"juniper\" + ) -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination: + """Return vulnerability data stored in index \"jvn\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` :param page: set the page number of the response :type page: int @@ -156552,7 +157840,7 @@ def index_juniper_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_juniper_get_serialize( + _param = self._index_jvn_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156583,7 +157871,7 @@ def index_juniper_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", '404': "str", '500': "str", } @@ -156599,7 +157887,7 @@ def index_juniper_get( @validate_call - def index_juniper_get_with_http_info( + def index_jvn_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156636,10 +157924,10 @@ def index_juniper_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination]: - """Return vulnerability data stored in index \"juniper\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination]: + """Return vulnerability data stored in index \"jvn\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` :param page: set the page number of the response :type page: int @@ -156709,7 +157997,7 @@ def index_juniper_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_juniper_get_serialize( + _param = self._index_jvn_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156740,7 +158028,7 @@ def index_juniper_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", '404': "str", '500': "str", } @@ -156756,7 +158044,7 @@ def index_juniper_get_with_http_info( @validate_call - def index_juniper_get_without_preload_content( + def index_jvn_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156794,9 +158082,9 @@ def index_juniper_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"juniper\" + """Return vulnerability data stored in index \"jvn\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` :param page: set the page number of the response :type page: int @@ -156866,7 +158154,7 @@ def index_juniper_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_juniper_get_serialize( + _param = self._index_jvn_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156897,7 +158185,7 @@ def index_juniper_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", '404': "str", '500': "str", } @@ -156908,7 +158196,7 @@ def index_juniper_get_without_preload_content( return response_data.response - def _index_juniper_get_serialize( + def _index_jvn_get_serialize( self, page, limit, @@ -157068,7 +158356,7 @@ def _index_juniper_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/juniper', + resource_path='/index/jvn', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -157085,7 +158373,7 @@ def _index_juniper_get_serialize( @validate_call - def index_jvn_get( + def index_jvndb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157122,10 +158410,10 @@ def index_jvn_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination: - """Return vulnerability data stored in index \"jvn\" + ) -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination: + """Return vulnerability data stored in index \"jvndb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` :param page: set the page number of the response :type page: int @@ -157195,7 +158483,7 @@ def index_jvn_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvn_get_serialize( + _param = self._index_jvndb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157226,7 +158514,7 @@ def index_jvn_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", '404': "str", '500': "str", } @@ -157242,7 +158530,7 @@ def index_jvn_get( @validate_call - def index_jvn_get_with_http_info( + def index_jvndb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157279,10 +158567,10 @@ def index_jvn_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination]: - """Return vulnerability data stored in index \"jvn\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination]: + """Return vulnerability data stored in index \"jvndb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` :param page: set the page number of the response :type page: int @@ -157352,7 +158640,7 @@ def index_jvn_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvn_get_serialize( + _param = self._index_jvndb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157383,7 +158671,7 @@ def index_jvn_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", '404': "str", '500': "str", } @@ -157399,7 +158687,7 @@ def index_jvn_get_with_http_info( @validate_call - def index_jvn_get_without_preload_content( + def index_jvndb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157437,9 +158725,9 @@ def index_jvn_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jvn\" + """Return vulnerability data stored in index \"jvndb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` :param page: set the page number of the response :type page: int @@ -157509,7 +158797,7 @@ def index_jvn_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvn_get_serialize( + _param = self._index_jvndb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157540,7 +158828,7 @@ def index_jvn_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", '404': "str", '500': "str", } @@ -157551,7 +158839,7 @@ def index_jvn_get_without_preload_content( return response_data.response - def _index_jvn_get_serialize( + def _index_jvndb_get_serialize( self, page, limit, @@ -157711,7 +158999,7 @@ def _index_jvn_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/jvn', + resource_path='/index/jvndb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -157728,7 +159016,7 @@ def _index_jvn_get_serialize( @validate_call - def index_jvndb_get( + def index_kaspersky_ics_cert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157765,10 +159053,10 @@ def index_jvndb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination: - """Return vulnerability data stored in index \"jvndb\" + ) -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"kaspersky-ics-cert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` :param page: set the page number of the response :type page: int @@ -157838,7 +159126,7 @@ def index_jvndb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvndb_get_serialize( + _param = self._index_kaspersky_ics_cert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157869,7 +159157,7 @@ def index_jvndb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -157885,7 +159173,7 @@ def index_jvndb_get( @validate_call - def index_jvndb_get_with_http_info( + def index_kaspersky_ics_cert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157922,10 +159210,10 @@ def index_jvndb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination]: - """Return vulnerability data stored in index \"jvndb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"kaspersky-ics-cert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` :param page: set the page number of the response :type page: int @@ -157995,7 +159283,7 @@ def index_jvndb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvndb_get_serialize( + _param = self._index_kaspersky_ics_cert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158026,7 +159314,7 @@ def index_jvndb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -158042,7 +159330,7 @@ def index_jvndb_get_with_http_info( @validate_call - def index_jvndb_get_without_preload_content( + def index_kaspersky_ics_cert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158080,9 +159368,9 @@ def index_jvndb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jvndb\" + """Return vulnerability data stored in index \"kaspersky-ics-cert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` :param page: set the page number of the response :type page: int @@ -158152,7 +159440,7 @@ def index_jvndb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvndb_get_serialize( + _param = self._index_kaspersky_ics_cert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158183,7 +159471,7 @@ def index_jvndb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -158194,7 +159482,7 @@ def index_jvndb_get_without_preload_content( return response_data.response - def _index_jvndb_get_serialize( + def _index_kaspersky_ics_cert_get_serialize( self, page, limit, @@ -158354,7 +159642,7 @@ def _index_jvndb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/jvndb', + resource_path='/index/kaspersky-ics-cert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -158371,7 +159659,7 @@ def _index_jvndb_get_serialize( @validate_call - def index_kaspersky_ics_cert_get( + def index_korelogic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158408,10 +159696,10 @@ def index_kaspersky_ics_cert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"kaspersky-ics-cert\" + ) -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination: + """Return vulnerability data stored in index \"korelogic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` :param page: set the page number of the response :type page: int @@ -158481,7 +159769,7 @@ def index_kaspersky_ics_cert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kaspersky_ics_cert_get_serialize( + _param = self._index_korelogic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158512,7 +159800,7 @@ def index_kaspersky_ics_cert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", '404': "str", '500': "str", } @@ -158528,7 +159816,7 @@ def index_kaspersky_ics_cert_get( @validate_call - def index_kaspersky_ics_cert_get_with_http_info( + def index_korelogic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158565,10 +159853,10 @@ def index_kaspersky_ics_cert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"kaspersky-ics-cert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination]: + """Return vulnerability data stored in index \"korelogic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` :param page: set the page number of the response :type page: int @@ -158638,7 +159926,7 @@ def index_kaspersky_ics_cert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kaspersky_ics_cert_get_serialize( + _param = self._index_korelogic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158669,7 +159957,7 @@ def index_kaspersky_ics_cert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", '404': "str", '500': "str", } @@ -158685,7 +159973,7 @@ def index_kaspersky_ics_cert_get_with_http_info( @validate_call - def index_kaspersky_ics_cert_get_without_preload_content( + def index_korelogic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158723,9 +160011,9 @@ def index_kaspersky_ics_cert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"kaspersky-ics-cert\" + """Return vulnerability data stored in index \"korelogic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` :param page: set the page number of the response :type page: int @@ -158795,7 +160083,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kaspersky_ics_cert_get_serialize( + _param = self._index_korelogic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158826,7 +160114,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", '404': "str", '500': "str", } @@ -158837,7 +160125,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( return response_data.response - def _index_kaspersky_ics_cert_get_serialize( + def _index_korelogic_get_serialize( self, page, limit, @@ -158997,7 +160285,7 @@ def _index_kaspersky_ics_cert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/kaspersky-ics-cert', + resource_path='/index/korelogic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -159014,7 +160302,7 @@ def _index_kaspersky_ics_cert_get_serialize( @validate_call - def index_korelogic_get( + def index_krcert_security_notices_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159051,10 +160339,10 @@ def index_korelogic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination: - """Return vulnerability data stored in index \"korelogic\" + ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"krcert-security-notices\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` :param page: set the page number of the response :type page: int @@ -159124,7 +160412,7 @@ def index_korelogic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_korelogic_get_serialize( + _param = self._index_krcert_security_notices_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159155,7 +160443,7 @@ def index_korelogic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -159171,7 +160459,7 @@ def index_korelogic_get( @validate_call - def index_korelogic_get_with_http_info( + def index_krcert_security_notices_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159208,10 +160496,10 @@ def index_korelogic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination]: - """Return vulnerability data stored in index \"korelogic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"krcert-security-notices\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` :param page: set the page number of the response :type page: int @@ -159281,7 +160569,7 @@ def index_korelogic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_korelogic_get_serialize( + _param = self._index_krcert_security_notices_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159312,7 +160600,7 @@ def index_korelogic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -159328,7 +160616,7 @@ def index_korelogic_get_with_http_info( @validate_call - def index_korelogic_get_without_preload_content( + def index_krcert_security_notices_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159366,9 +160654,9 @@ def index_korelogic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"korelogic\" + """Return vulnerability data stored in index \"krcert-security-notices\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` :param page: set the page number of the response :type page: int @@ -159438,7 +160726,7 @@ def index_korelogic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_korelogic_get_serialize( + _param = self._index_krcert_security_notices_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159469,7 +160757,7 @@ def index_korelogic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -159480,7 +160768,7 @@ def index_korelogic_get_without_preload_content( return response_data.response - def _index_korelogic_get_serialize( + def _index_krcert_security_notices_get_serialize( self, page, limit, @@ -159640,7 +160928,7 @@ def _index_korelogic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/korelogic', + resource_path='/index/krcert-security-notices', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -159657,7 +160945,7 @@ def _index_korelogic_get_serialize( @validate_call - def index_krcert_security_notices_get( + def index_krcert_vulnerabilities_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159695,9 +160983,9 @@ def index_krcert_security_notices_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"krcert-security-notices\" + """Return vulnerability data stored in index \"krcert-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -159767,7 +161055,7 @@ def index_krcert_security_notices_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_security_notices_get_serialize( + _param = self._index_krcert_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159814,7 +161102,7 @@ def index_krcert_security_notices_get( @validate_call - def index_krcert_security_notices_get_with_http_info( + def index_krcert_vulnerabilities_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159852,9 +161140,9 @@ def index_krcert_security_notices_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"krcert-security-notices\" + """Return vulnerability data stored in index \"krcert-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -159924,7 +161212,7 @@ def index_krcert_security_notices_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_security_notices_get_serialize( + _param = self._index_krcert_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159971,7 +161259,7 @@ def index_krcert_security_notices_get_with_http_info( @validate_call - def index_krcert_security_notices_get_without_preload_content( + def index_krcert_vulnerabilities_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160009,9 +161297,9 @@ def index_krcert_security_notices_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"krcert-security-notices\" + """Return vulnerability data stored in index \"krcert-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -160081,7 +161369,7 @@ def index_krcert_security_notices_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_security_notices_get_serialize( + _param = self._index_krcert_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160123,7 +161411,7 @@ def index_krcert_security_notices_get_without_preload_content( return response_data.response - def _index_krcert_security_notices_get_serialize( + def _index_krcert_vulnerabilities_get_serialize( self, page, limit, @@ -160283,7 +161571,7 @@ def _index_krcert_security_notices_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/krcert-security-notices', + resource_path='/index/krcert-vulnerabilities', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -160300,7 +161588,7 @@ def _index_krcert_security_notices_get_serialize( @validate_call - def index_krcert_vulnerabilities_get( + def index_kubernetes_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160337,10 +161625,10 @@ def index_krcert_vulnerabilities_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"krcert-vulnerabilities\" + ) -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination: + """Return vulnerability data stored in index \"kubernetes\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` :param page: set the page number of the response :type page: int @@ -160410,7 +161698,7 @@ def index_krcert_vulnerabilities_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_vulnerabilities_get_serialize( + _param = self._index_kubernetes_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160441,7 +161729,7 @@ def index_krcert_vulnerabilities_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", '404': "str", '500': "str", } @@ -160457,7 +161745,7 @@ def index_krcert_vulnerabilities_get( @validate_call - def index_krcert_vulnerabilities_get_with_http_info( + def index_kubernetes_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160494,10 +161782,10 @@ def index_krcert_vulnerabilities_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"krcert-vulnerabilities\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination]: + """Return vulnerability data stored in index \"kubernetes\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` :param page: set the page number of the response :type page: int @@ -160567,7 +161855,7 @@ def index_krcert_vulnerabilities_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_vulnerabilities_get_serialize( + _param = self._index_kubernetes_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160598,7 +161886,7 @@ def index_krcert_vulnerabilities_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", '404': "str", '500': "str", } @@ -160614,7 +161902,7 @@ def index_krcert_vulnerabilities_get_with_http_info( @validate_call - def index_krcert_vulnerabilities_get_without_preload_content( + def index_kubernetes_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160652,9 +161940,9 @@ def index_krcert_vulnerabilities_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"krcert-vulnerabilities\" + """Return vulnerability data stored in index \"kubernetes\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` :param page: set the page number of the response :type page: int @@ -160724,7 +162012,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_vulnerabilities_get_serialize( + _param = self._index_kubernetes_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160755,7 +162043,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", '404': "str", '500': "str", } @@ -160766,7 +162054,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( return response_data.response - def _index_krcert_vulnerabilities_get_serialize( + def _index_kubernetes_get_serialize( self, page, limit, @@ -160926,7 +162214,7 @@ def _index_krcert_vulnerabilities_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/krcert-vulnerabilities', + resource_path='/index/kubernetes', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -160943,7 +162231,7 @@ def _index_krcert_vulnerabilities_get_serialize( @validate_call - def index_kubernetes_get( + def index_kunbus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160980,10 +162268,10 @@ def index_kubernetes_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination: - """Return vulnerability data stored in index \"kubernetes\" + ) -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination: + """Return vulnerability data stored in index \"kunbus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` :param page: set the page number of the response :type page: int @@ -161053,7 +162341,7 @@ def index_kubernetes_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kubernetes_get_serialize( + _param = self._index_kunbus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161084,7 +162372,7 @@ def index_kubernetes_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", '404': "str", '500': "str", } @@ -161100,7 +162388,7 @@ def index_kubernetes_get( @validate_call - def index_kubernetes_get_with_http_info( + def index_kunbus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161137,10 +162425,10 @@ def index_kubernetes_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination]: - """Return vulnerability data stored in index \"kubernetes\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination]: + """Return vulnerability data stored in index \"kunbus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` :param page: set the page number of the response :type page: int @@ -161210,7 +162498,7 @@ def index_kubernetes_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kubernetes_get_serialize( + _param = self._index_kunbus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161241,7 +162529,7 @@ def index_kubernetes_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", '404': "str", '500': "str", } @@ -161257,7 +162545,7 @@ def index_kubernetes_get_with_http_info( @validate_call - def index_kubernetes_get_without_preload_content( + def index_kunbus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161295,9 +162583,9 @@ def index_kubernetes_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"kubernetes\" + """Return vulnerability data stored in index \"kunbus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` :param page: set the page number of the response :type page: int @@ -161367,7 +162655,7 @@ def index_kubernetes_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kubernetes_get_serialize( + _param = self._index_kunbus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161398,7 +162686,7 @@ def index_kubernetes_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", '404': "str", '500': "str", } @@ -161409,7 +162697,7 @@ def index_kubernetes_get_without_preload_content( return response_data.response - def _index_kubernetes_get_serialize( + def _index_kunbus_get_serialize( self, page, limit, @@ -161569,7 +162857,7 @@ def _index_kubernetes_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/kubernetes', + resource_path='/index/kunbus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -161586,7 +162874,7 @@ def _index_kubernetes_get_serialize( @validate_call - def index_kunbus_get( + def index_lantronix_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161623,10 +162911,10 @@ def index_kunbus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination: - """Return vulnerability data stored in index \"kunbus\" + ) -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination: + """Return vulnerability data stored in index \"lantronix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` :param page: set the page number of the response :type page: int @@ -161696,7 +162984,7 @@ def index_kunbus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kunbus_get_serialize( + _param = self._index_lantronix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161727,7 +163015,7 @@ def index_kunbus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", '404': "str", '500': "str", } @@ -161743,7 +163031,7 @@ def index_kunbus_get( @validate_call - def index_kunbus_get_with_http_info( + def index_lantronix_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161780,10 +163068,10 @@ def index_kunbus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination]: - """Return vulnerability data stored in index \"kunbus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination]: + """Return vulnerability data stored in index \"lantronix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` :param page: set the page number of the response :type page: int @@ -161853,7 +163141,7 @@ def index_kunbus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kunbus_get_serialize( + _param = self._index_lantronix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161884,7 +163172,7 @@ def index_kunbus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", '404': "str", '500': "str", } @@ -161900,7 +163188,7 @@ def index_kunbus_get_with_http_info( @validate_call - def index_kunbus_get_without_preload_content( + def index_lantronix_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161938,9 +163226,9 @@ def index_kunbus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"kunbus\" + """Return vulnerability data stored in index \"lantronix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` :param page: set the page number of the response :type page: int @@ -162010,7 +163298,7 @@ def index_kunbus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kunbus_get_serialize( + _param = self._index_lantronix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162041,7 +163329,7 @@ def index_kunbus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", '404': "str", '500': "str", } @@ -162052,7 +163340,7 @@ def index_kunbus_get_without_preload_content( return response_data.response - def _index_kunbus_get_serialize( + def _index_lantronix_get_serialize( self, page, limit, @@ -162212,7 +163500,7 @@ def _index_kunbus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/kunbus', + resource_path='/index/lantronix', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -162229,7 +163517,7 @@ def _index_kunbus_get_serialize( @validate_call - def index_lantronix_get( + def index_lenovo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162266,10 +163554,10 @@ def index_lantronix_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination: - """Return vulnerability data stored in index \"lantronix\" + ) -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination: + """Return vulnerability data stored in index \"lenovo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` :param page: set the page number of the response :type page: int @@ -162339,7 +163627,7 @@ def index_lantronix_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lantronix_get_serialize( + _param = self._index_lenovo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162370,7 +163658,7 @@ def index_lantronix_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", '404': "str", '500': "str", } @@ -162386,7 +163674,7 @@ def index_lantronix_get( @validate_call - def index_lantronix_get_with_http_info( + def index_lenovo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162423,10 +163711,10 @@ def index_lantronix_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination]: - """Return vulnerability data stored in index \"lantronix\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination]: + """Return vulnerability data stored in index \"lenovo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` :param page: set the page number of the response :type page: int @@ -162496,7 +163784,7 @@ def index_lantronix_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lantronix_get_serialize( + _param = self._index_lenovo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162527,7 +163815,7 @@ def index_lantronix_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", '404': "str", '500': "str", } @@ -162543,7 +163831,7 @@ def index_lantronix_get_with_http_info( @validate_call - def index_lantronix_get_without_preload_content( + def index_lenovo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162581,9 +163869,9 @@ def index_lantronix_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lantronix\" + """Return vulnerability data stored in index \"lenovo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` :param page: set the page number of the response :type page: int @@ -162653,7 +163941,7 @@ def index_lantronix_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lantronix_get_serialize( + _param = self._index_lenovo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162684,7 +163972,7 @@ def index_lantronix_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", '404': "str", '500': "str", } @@ -162695,7 +163983,7 @@ def index_lantronix_get_without_preload_content( return response_data.response - def _index_lantronix_get_serialize( + def _index_lenovo_get_serialize( self, page, limit, @@ -162855,7 +164143,7 @@ def _index_lantronix_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/lantronix', + resource_path='/index/lenovo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -162872,7 +164160,7 @@ def _index_lantronix_get_serialize( @validate_call - def index_lenovo_get( + def index_lexmark_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162909,10 +164197,10 @@ def index_lenovo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination: - """Return vulnerability data stored in index \"lenovo\" + ) -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"lexmark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` :param page: set the page number of the response :type page: int @@ -162982,7 +164270,7 @@ def index_lenovo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lenovo_get_serialize( + _param = self._index_lexmark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163013,7 +164301,7 @@ def index_lenovo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -163029,7 +164317,7 @@ def index_lenovo_get( @validate_call - def index_lenovo_get_with_http_info( + def index_lexmark_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163066,10 +164354,10 @@ def index_lenovo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination]: - """Return vulnerability data stored in index \"lenovo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"lexmark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` :param page: set the page number of the response :type page: int @@ -163139,7 +164427,7 @@ def index_lenovo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lenovo_get_serialize( + _param = self._index_lexmark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163170,7 +164458,7 @@ def index_lenovo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -163186,7 +164474,7 @@ def index_lenovo_get_with_http_info( @validate_call - def index_lenovo_get_without_preload_content( + def index_lexmark_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163224,9 +164512,9 @@ def index_lenovo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lenovo\" + """Return vulnerability data stored in index \"lexmark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` :param page: set the page number of the response :type page: int @@ -163296,7 +164584,7 @@ def index_lenovo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lenovo_get_serialize( + _param = self._index_lexmark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163327,7 +164615,7 @@ def index_lenovo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -163338,7 +164626,7 @@ def index_lenovo_get_without_preload_content( return response_data.response - def _index_lenovo_get_serialize( + def _index_lexmark_get_serialize( self, page, limit, @@ -163498,7 +164786,7 @@ def _index_lenovo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/lenovo', + resource_path='/index/lexmark', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -163515,7 +164803,7 @@ def _index_lenovo_get_serialize( @validate_call - def index_lexmark_get( + def index_lg_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163552,10 +164840,10 @@ def index_lexmark_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"lexmark\" + ) -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination: + """Return vulnerability data stored in index \"lg\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` :param page: set the page number of the response :type page: int @@ -163625,7 +164913,7 @@ def index_lexmark_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lexmark_get_serialize( + _param = self._index_lg_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163656,7 +164944,7 @@ def index_lexmark_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", '404': "str", '500': "str", } @@ -163672,7 +164960,7 @@ def index_lexmark_get( @validate_call - def index_lexmark_get_with_http_info( + def index_lg_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163709,10 +164997,10 @@ def index_lexmark_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"lexmark\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination]: + """Return vulnerability data stored in index \"lg\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` :param page: set the page number of the response :type page: int @@ -163782,7 +165070,7 @@ def index_lexmark_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lexmark_get_serialize( + _param = self._index_lg_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163813,7 +165101,7 @@ def index_lexmark_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", '404': "str", '500': "str", } @@ -163829,7 +165117,7 @@ def index_lexmark_get_with_http_info( @validate_call - def index_lexmark_get_without_preload_content( + def index_lg_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163867,9 +165155,9 @@ def index_lexmark_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lexmark\" + """Return vulnerability data stored in index \"lg\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` :param page: set the page number of the response :type page: int @@ -163939,7 +165227,7 @@ def index_lexmark_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lexmark_get_serialize( + _param = self._index_lg_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163970,7 +165258,7 @@ def index_lexmark_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", '404': "str", '500': "str", } @@ -163981,7 +165269,7 @@ def index_lexmark_get_without_preload_content( return response_data.response - def _index_lexmark_get_serialize( + def _index_lg_get_serialize( self, page, limit, @@ -164141,7 +165429,7 @@ def _index_lexmark_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/lexmark', + resource_path='/index/lg', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -164158,7 +165446,7 @@ def _index_lexmark_get_serialize( @validate_call - def index_lg_get( + def index_libre_office_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164195,10 +165483,10 @@ def index_lg_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination: - """Return vulnerability data stored in index \"lg\" + ) -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination: + """Return vulnerability data stored in index \"libre-office\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` :param page: set the page number of the response :type page: int @@ -164268,7 +165556,7 @@ def index_lg_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lg_get_serialize( + _param = self._index_libre_office_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164299,7 +165587,7 @@ def index_lg_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", '404': "str", '500': "str", } @@ -164315,7 +165603,7 @@ def index_lg_get( @validate_call - def index_lg_get_with_http_info( + def index_libre_office_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164352,10 +165640,10 @@ def index_lg_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination]: - """Return vulnerability data stored in index \"lg\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination]: + """Return vulnerability data stored in index \"libre-office\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` :param page: set the page number of the response :type page: int @@ -164425,7 +165713,7 @@ def index_lg_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lg_get_serialize( + _param = self._index_libre_office_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164456,7 +165744,7 @@ def index_lg_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", '404': "str", '500': "str", } @@ -164472,7 +165760,7 @@ def index_lg_get_with_http_info( @validate_call - def index_lg_get_without_preload_content( + def index_libre_office_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164510,9 +165798,9 @@ def index_lg_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lg\" + """Return vulnerability data stored in index \"libre-office\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` :param page: set the page number of the response :type page: int @@ -164582,7 +165870,7 @@ def index_lg_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lg_get_serialize( + _param = self._index_libre_office_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164613,7 +165901,7 @@ def index_lg_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", '404': "str", '500': "str", } @@ -164624,7 +165912,7 @@ def index_lg_get_without_preload_content( return response_data.response - def _index_lg_get_serialize( + def _index_libre_office_get_serialize( self, page, limit, @@ -164784,7 +166072,7 @@ def _index_lg_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/lg', + resource_path='/index/libre-office', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -164801,7 +166089,7 @@ def _index_lg_get_serialize( @validate_call - def index_libre_office_get( + def index_linux_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164838,10 +166126,10 @@ def index_libre_office_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination: - """Return vulnerability data stored in index \"libre-office\" + ) -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination: + """Return vulnerability data stored in index \"linux\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` :param page: set the page number of the response :type page: int @@ -164911,7 +166199,7 @@ def index_libre_office_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_libre_office_get_serialize( + _param = self._index_linux_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164942,7 +166230,7 @@ def index_libre_office_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", '404': "str", '500': "str", } @@ -164958,7 +166246,7 @@ def index_libre_office_get( @validate_call - def index_libre_office_get_with_http_info( + def index_linux_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164995,10 +166283,10 @@ def index_libre_office_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination]: - """Return vulnerability data stored in index \"libre-office\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination]: + """Return vulnerability data stored in index \"linux\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` :param page: set the page number of the response :type page: int @@ -165068,7 +166356,7 @@ def index_libre_office_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_libre_office_get_serialize( + _param = self._index_linux_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165099,7 +166387,7 @@ def index_libre_office_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", '404': "str", '500': "str", } @@ -165115,7 +166403,7 @@ def index_libre_office_get_with_http_info( @validate_call - def index_libre_office_get_without_preload_content( + def index_linux_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165153,9 +166441,9 @@ def index_libre_office_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"libre-office\" + """Return vulnerability data stored in index \"linux\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` :param page: set the page number of the response :type page: int @@ -165225,7 +166513,7 @@ def index_libre_office_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_libre_office_get_serialize( + _param = self._index_linux_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165256,7 +166544,7 @@ def index_libre_office_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", '404': "str", '500': "str", } @@ -165267,7 +166555,7 @@ def index_libre_office_get_without_preload_content( return response_data.response - def _index_libre_office_get_serialize( + def _index_linux_get_serialize( self, page, limit, @@ -165427,7 +166715,7 @@ def _index_libre_office_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/libre-office', + resource_path='/index/linux', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -165444,7 +166732,7 @@ def _index_libre_office_get_serialize( @validate_call - def index_linux_get( + def index_lol_advs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165481,10 +166769,10 @@ def index_linux_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination: - """Return vulnerability data stored in index \"linux\" + ) -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination: + """Return vulnerability data stored in index \"lol-advs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` :param page: set the page number of the response :type page: int @@ -165554,7 +166842,7 @@ def index_linux_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_linux_get_serialize( + _param = self._index_lol_advs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165585,7 +166873,7 @@ def index_linux_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", '404': "str", '500': "str", } @@ -165601,7 +166889,7 @@ def index_linux_get( @validate_call - def index_linux_get_with_http_info( + def index_lol_advs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165638,10 +166926,10 @@ def index_linux_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination]: - """Return vulnerability data stored in index \"linux\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination]: + """Return vulnerability data stored in index \"lol-advs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` :param page: set the page number of the response :type page: int @@ -165711,7 +166999,7 @@ def index_linux_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_linux_get_serialize( + _param = self._index_lol_advs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165742,7 +167030,7 @@ def index_linux_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", '404': "str", '500': "str", } @@ -165758,7 +167046,7 @@ def index_linux_get_with_http_info( @validate_call - def index_linux_get_without_preload_content( + def index_lol_advs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165796,9 +167084,9 @@ def index_linux_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"linux\" + """Return vulnerability data stored in index \"lol-advs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` :param page: set the page number of the response :type page: int @@ -165868,7 +167156,7 @@ def index_linux_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_linux_get_serialize( + _param = self._index_lol_advs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165899,7 +167187,7 @@ def index_linux_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", '404': "str", '500': "str", } @@ -165910,7 +167198,7 @@ def index_linux_get_without_preload_content( return response_data.response - def _index_linux_get_serialize( + def _index_lol_advs_get_serialize( self, page, limit, @@ -166070,7 +167358,7 @@ def _index_linux_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/linux', + resource_path='/index/lol-advs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -166087,7 +167375,7 @@ def _index_linux_get_serialize( @validate_call - def index_lol_advs_get( + def index_m_files_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166124,10 +167412,10 @@ def index_lol_advs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination: - """Return vulnerability data stored in index \"lol-advs\" + ) -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination: + """Return vulnerability data stored in index \"m-files\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` :param page: set the page number of the response :type page: int @@ -166197,7 +167485,7 @@ def index_lol_advs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lol_advs_get_serialize( + _param = self._index_m_files_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166228,7 +167516,7 @@ def index_lol_advs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", '404': "str", '500': "str", } @@ -166244,7 +167532,7 @@ def index_lol_advs_get( @validate_call - def index_lol_advs_get_with_http_info( + def index_m_files_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166281,10 +167569,10 @@ def index_lol_advs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination]: - """Return vulnerability data stored in index \"lol-advs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination]: + """Return vulnerability data stored in index \"m-files\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` :param page: set the page number of the response :type page: int @@ -166354,7 +167642,7 @@ def index_lol_advs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lol_advs_get_serialize( + _param = self._index_m_files_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166385,7 +167673,7 @@ def index_lol_advs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", '404': "str", '500': "str", } @@ -166401,7 +167689,7 @@ def index_lol_advs_get_with_http_info( @validate_call - def index_lol_advs_get_without_preload_content( + def index_m_files_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166439,9 +167727,9 @@ def index_lol_advs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lol-advs\" + """Return vulnerability data stored in index \"m-files\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` :param page: set the page number of the response :type page: int @@ -166511,7 +167799,7 @@ def index_lol_advs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lol_advs_get_serialize( + _param = self._index_m_files_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166542,7 +167830,7 @@ def index_lol_advs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", '404': "str", '500': "str", } @@ -166553,7 +167841,7 @@ def index_lol_advs_get_without_preload_content( return response_data.response - def _index_lol_advs_get_serialize( + def _index_m_files_get_serialize( self, page, limit, @@ -166713,7 +168001,7 @@ def _index_lol_advs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/lol-advs', + resource_path='/index/m-files', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -166730,7 +168018,7 @@ def _index_lol_advs_get_serialize( @validate_call - def index_m_files_get( + def index_macert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166767,10 +168055,10 @@ def index_m_files_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination: - """Return vulnerability data stored in index \"m-files\" + ) -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination: + """Return vulnerability data stored in index \"macert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` :param page: set the page number of the response :type page: int @@ -166840,7 +168128,7 @@ def index_m_files_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_m_files_get_serialize( + _param = self._index_macert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166871,7 +168159,7 @@ def index_m_files_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", '404': "str", '500': "str", } @@ -166887,7 +168175,7 @@ def index_m_files_get( @validate_call - def index_m_files_get_with_http_info( + def index_macert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166924,10 +168212,10 @@ def index_m_files_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination]: - """Return vulnerability data stored in index \"m-files\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination]: + """Return vulnerability data stored in index \"macert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` :param page: set the page number of the response :type page: int @@ -166997,7 +168285,7 @@ def index_m_files_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_m_files_get_serialize( + _param = self._index_macert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167028,7 +168316,7 @@ def index_m_files_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", '404': "str", '500': "str", } @@ -167044,7 +168332,7 @@ def index_m_files_get_with_http_info( @validate_call - def index_m_files_get_without_preload_content( + def index_macert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167082,9 +168370,9 @@ def index_m_files_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"m-files\" + """Return vulnerability data stored in index \"macert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` :param page: set the page number of the response :type page: int @@ -167154,7 +168442,7 @@ def index_m_files_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_m_files_get_serialize( + _param = self._index_macert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167185,7 +168473,7 @@ def index_m_files_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", '404': "str", '500': "str", } @@ -167196,7 +168484,7 @@ def index_m_files_get_without_preload_content( return response_data.response - def _index_m_files_get_serialize( + def _index_macert_get_serialize( self, page, limit, @@ -167356,7 +168644,7 @@ def _index_m_files_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/m-files', + resource_path='/index/macert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -167373,7 +168661,7 @@ def _index_m_files_get_serialize( @validate_call - def index_macert_get( + def index_malicious_packages_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167410,10 +168698,10 @@ def index_macert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination: - """Return vulnerability data stored in index \"macert\" + ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination: + """Return vulnerability data stored in index \"malicious-packages\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` :param page: set the page number of the response :type page: int @@ -167483,7 +168771,7 @@ def index_macert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_macert_get_serialize( + _param = self._index_malicious_packages_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167514,7 +168802,7 @@ def index_macert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", '404': "str", '500': "str", } @@ -167530,7 +168818,7 @@ def index_macert_get( @validate_call - def index_macert_get_with_http_info( + def index_malicious_packages_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167567,10 +168855,10 @@ def index_macert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination]: - """Return vulnerability data stored in index \"macert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination]: + """Return vulnerability data stored in index \"malicious-packages\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` :param page: set the page number of the response :type page: int @@ -167640,7 +168928,7 @@ def index_macert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_macert_get_serialize( + _param = self._index_malicious_packages_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167671,7 +168959,7 @@ def index_macert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", '404': "str", '500': "str", } @@ -167687,7 +168975,7 @@ def index_macert_get_with_http_info( @validate_call - def index_macert_get_without_preload_content( + def index_malicious_packages_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167725,9 +169013,9 @@ def index_macert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"macert\" + """Return vulnerability data stored in index \"malicious-packages\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` :param page: set the page number of the response :type page: int @@ -167797,7 +169085,7 @@ def index_macert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_macert_get_serialize( + _param = self._index_malicious_packages_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167828,7 +169116,7 @@ def index_macert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", '404': "str", '500': "str", } @@ -167839,7 +169127,7 @@ def index_macert_get_without_preload_content( return response_data.response - def _index_macert_get_serialize( + def _index_malicious_packages_get_serialize( self, page, limit, @@ -167999,7 +169287,7 @@ def _index_macert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/macert', + resource_path='/index/malicious-packages', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -168016,164 +169304,7 @@ def _index_macert_get_serialize( @validate_call - def index_malicious_packages_get( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, - iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, - threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, - mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, - misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, - ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, - botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination: - """Return vulnerability data stored in index \"malicious-packages\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param alias: Specify a vulnerability alias to search with. - :type alias: str - :param iava: Specify an IAVA ID to search with. - :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str - :param threat_actor: Specify a threat actor name to search with. - :type threat_actor: str - :param mitre_id: Specify a MITRE ID to search with. - :type mitre_id: str - :param misp_id: Specify a MISP ID to search with. - :type misp_id: str - :param ransomware: Specify a ransomeware family name to search with. - :type ransomware: str - :param botnet: Specify a botnet name to search with. - :type botnet: str - :param published: Specify a published date - :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_malicious_packages_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - cve=cve, - alias=alias, - iava=iava, - jvndb=jvndb, - ilvn=ilvn, - threat_actor=threat_actor, - mitre_id=mitre_id, - misp_id=misp_id, - ransomware=ransomware, - botnet=botnet, - published=published, - var_date=var_date, - var_date2=var_date2, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", - '404': "str", - '500': "str", - } - response_data = self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - response_data.read() - return self.api_client.response_deserialize( - response_data=response_data, - response_types_map=_response_types_map, - ).data - - - @validate_call - def index_malicious_packages_get_with_http_info( + def index_manageengine_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168210,10 +169341,10 @@ def index_malicious_packages_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination]: - """Return vulnerability data stored in index \"malicious-packages\" + ) -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"manageengine\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` :param page: set the page number of the response :type page: int @@ -168283,7 +169414,7 @@ def index_malicious_packages_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_packages_get_serialize( + _param = self._index_manageengine_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168314,7 +169445,164 @@ def index_malicious_packages_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_manageengine_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"manageengine\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_manageengine_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -168330,7 +169618,7 @@ def index_malicious_packages_get_with_http_info( @validate_call - def index_malicious_packages_get_without_preload_content( + def index_manageengine_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168368,9 +169656,9 @@ def index_malicious_packages_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"malicious-packages\" + """Return vulnerability data stored in index \"manageengine\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` :param page: set the page number of the response :type page: int @@ -168440,7 +169728,7 @@ def index_malicious_packages_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_packages_get_serialize( + _param = self._index_manageengine_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168471,7 +169759,7 @@ def index_malicious_packages_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -168482,7 +169770,7 @@ def index_malicious_packages_get_without_preload_content( return response_data.response - def _index_malicious_packages_get_serialize( + def _index_manageengine_get_serialize( self, page, limit, @@ -168642,7 +169930,7 @@ def _index_malicious_packages_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/malicious-packages', + resource_path='/index/manageengine', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -168659,7 +169947,7 @@ def _index_malicious_packages_get_serialize( @validate_call - def index_manageengine_get( + def index_maven_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168696,10 +169984,10 @@ def index_manageengine_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"manageengine\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"maven\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` :param page: set the page number of the response :type page: int @@ -168769,7 +170057,7 @@ def index_manageengine_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_manageengine_get_serialize( + _param = self._index_maven_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168800,7 +170088,7 @@ def index_manageengine_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -168816,7 +170104,7 @@ def index_manageengine_get( @validate_call - def index_manageengine_get_with_http_info( + def index_maven_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168853,10 +170141,10 @@ def index_manageengine_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"manageengine\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"maven\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` :param page: set the page number of the response :type page: int @@ -168926,7 +170214,7 @@ def index_manageengine_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_manageengine_get_serialize( + _param = self._index_maven_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168957,7 +170245,7 @@ def index_manageengine_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -168973,7 +170261,7 @@ def index_manageengine_get_with_http_info( @validate_call - def index_manageengine_get_without_preload_content( + def index_maven_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169011,9 +170299,9 @@ def index_manageengine_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"manageengine\" + """Return vulnerability data stored in index \"maven\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` :param page: set the page number of the response :type page: int @@ -169083,7 +170371,7 @@ def index_manageengine_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_manageengine_get_serialize( + _param = self._index_maven_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169114,7 +170402,7 @@ def index_manageengine_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -169125,7 +170413,7 @@ def index_manageengine_get_without_preload_content( return response_data.response - def _index_manageengine_get_serialize( + def _index_maven_get_serialize( self, page, limit, @@ -169285,7 +170573,7 @@ def _index_manageengine_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/manageengine', + resource_path='/index/maven', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -169302,7 +170590,7 @@ def _index_manageengine_get_serialize( @validate_call - def index_maven_get( + def index_mbed_tls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169339,10 +170627,10 @@ def index_maven_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"maven\" + ) -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination: + """Return vulnerability data stored in index \"mbed-tls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` :param page: set the page number of the response :type page: int @@ -169412,7 +170700,7 @@ def index_maven_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_maven_get_serialize( + _param = self._index_mbed_tls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169443,7 +170731,7 @@ def index_maven_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", '404': "str", '500': "str", } @@ -169459,7 +170747,7 @@ def index_maven_get( @validate_call - def index_maven_get_with_http_info( + def index_mbed_tls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169496,10 +170784,10 @@ def index_maven_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"maven\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination]: + """Return vulnerability data stored in index \"mbed-tls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` :param page: set the page number of the response :type page: int @@ -169569,7 +170857,7 @@ def index_maven_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_maven_get_serialize( + _param = self._index_mbed_tls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169600,7 +170888,7 @@ def index_maven_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", '404': "str", '500': "str", } @@ -169616,7 +170904,7 @@ def index_maven_get_with_http_info( @validate_call - def index_maven_get_without_preload_content( + def index_mbed_tls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169654,9 +170942,9 @@ def index_maven_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"maven\" + """Return vulnerability data stored in index \"mbed-tls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` :param page: set the page number of the response :type page: int @@ -169726,7 +171014,7 @@ def index_maven_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_maven_get_serialize( + _param = self._index_mbed_tls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169757,7 +171045,7 @@ def index_maven_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", '404': "str", '500': "str", } @@ -169768,7 +171056,7 @@ def index_maven_get_without_preload_content( return response_data.response - def _index_maven_get_serialize( + def _index_mbed_tls_get_serialize( self, page, limit, @@ -169928,7 +171216,7 @@ def _index_maven_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/maven', + resource_path='/index/mbed-tls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -169945,7 +171233,7 @@ def _index_maven_get_serialize( @validate_call - def index_mbed_tls_get( + def index_mcafee_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169982,10 +171270,10 @@ def index_mbed_tls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination: - """Return vulnerability data stored in index \"mbed-tls\" + ) -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination: + """Return vulnerability data stored in index \"mcafee\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` :param page: set the page number of the response :type page: int @@ -170055,7 +171343,7 @@ def index_mbed_tls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mbed_tls_get_serialize( + _param = self._index_mcafee_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170086,7 +171374,7 @@ def index_mbed_tls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", '404': "str", '500': "str", } @@ -170102,7 +171390,7 @@ def index_mbed_tls_get( @validate_call - def index_mbed_tls_get_with_http_info( + def index_mcafee_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170139,10 +171427,10 @@ def index_mbed_tls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination]: - """Return vulnerability data stored in index \"mbed-tls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination]: + """Return vulnerability data stored in index \"mcafee\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` :param page: set the page number of the response :type page: int @@ -170212,7 +171500,7 @@ def index_mbed_tls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mbed_tls_get_serialize( + _param = self._index_mcafee_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170243,7 +171531,7 @@ def index_mbed_tls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", '404': "str", '500': "str", } @@ -170259,7 +171547,7 @@ def index_mbed_tls_get_with_http_info( @validate_call - def index_mbed_tls_get_without_preload_content( + def index_mcafee_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170297,9 +171585,9 @@ def index_mbed_tls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mbed-tls\" + """Return vulnerability data stored in index \"mcafee\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` :param page: set the page number of the response :type page: int @@ -170369,7 +171657,7 @@ def index_mbed_tls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mbed_tls_get_serialize( + _param = self._index_mcafee_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170400,7 +171688,7 @@ def index_mbed_tls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", '404': "str", '500': "str", } @@ -170411,7 +171699,7 @@ def index_mbed_tls_get_without_preload_content( return response_data.response - def _index_mbed_tls_get_serialize( + def _index_mcafee_get_serialize( self, page, limit, @@ -170571,7 +171859,7 @@ def _index_mbed_tls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mbed-tls', + resource_path='/index/mcafee', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -170588,7 +171876,7 @@ def _index_mbed_tls_get_serialize( @validate_call - def index_mcafee_get( + def index_mediatek_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170625,10 +171913,10 @@ def index_mcafee_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination: - """Return vulnerability data stored in index \"mcafee\" + ) -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination: + """Return vulnerability data stored in index \"mediatek\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` :param page: set the page number of the response :type page: int @@ -170698,7 +171986,7 @@ def index_mcafee_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mcafee_get_serialize( + _param = self._index_mediatek_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170729,7 +172017,7 @@ def index_mcafee_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", '404': "str", '500': "str", } @@ -170745,7 +172033,7 @@ def index_mcafee_get( @validate_call - def index_mcafee_get_with_http_info( + def index_mediatek_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170782,10 +172070,10 @@ def index_mcafee_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination]: - """Return vulnerability data stored in index \"mcafee\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination]: + """Return vulnerability data stored in index \"mediatek\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` :param page: set the page number of the response :type page: int @@ -170855,7 +172143,7 @@ def index_mcafee_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mcafee_get_serialize( + _param = self._index_mediatek_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170886,7 +172174,7 @@ def index_mcafee_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", '404': "str", '500': "str", } @@ -170902,7 +172190,7 @@ def index_mcafee_get_with_http_info( @validate_call - def index_mcafee_get_without_preload_content( + def index_mediatek_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170940,9 +172228,9 @@ def index_mcafee_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mcafee\" + """Return vulnerability data stored in index \"mediatek\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` :param page: set the page number of the response :type page: int @@ -171012,7 +172300,7 @@ def index_mcafee_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mcafee_get_serialize( + _param = self._index_mediatek_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171043,7 +172331,7 @@ def index_mcafee_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", '404': "str", '500': "str", } @@ -171054,7 +172342,7 @@ def index_mcafee_get_without_preload_content( return response_data.response - def _index_mcafee_get_serialize( + def _index_mediatek_get_serialize( self, page, limit, @@ -171214,7 +172502,7 @@ def _index_mcafee_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mcafee', + resource_path='/index/mediatek', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -171231,7 +172519,7 @@ def _index_mcafee_get_serialize( @validate_call - def index_mediatek_get( + def index_medtronic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171268,10 +172556,10 @@ def index_mediatek_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination: - """Return vulnerability data stored in index \"mediatek\" + ) -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"medtronic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` :param page: set the page number of the response :type page: int @@ -171341,7 +172629,7 @@ def index_mediatek_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mediatek_get_serialize( + _param = self._index_medtronic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171372,7 +172660,7 @@ def index_mediatek_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -171388,7 +172676,7 @@ def index_mediatek_get( @validate_call - def index_mediatek_get_with_http_info( + def index_medtronic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171425,10 +172713,10 @@ def index_mediatek_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination]: - """Return vulnerability data stored in index \"mediatek\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"medtronic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` :param page: set the page number of the response :type page: int @@ -171498,7 +172786,7 @@ def index_mediatek_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mediatek_get_serialize( + _param = self._index_medtronic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171529,7 +172817,7 @@ def index_mediatek_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -171545,7 +172833,7 @@ def index_mediatek_get_with_http_info( @validate_call - def index_mediatek_get_without_preload_content( + def index_medtronic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171583,9 +172871,9 @@ def index_mediatek_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mediatek\" + """Return vulnerability data stored in index \"medtronic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` :param page: set the page number of the response :type page: int @@ -171655,7 +172943,7 @@ def index_mediatek_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mediatek_get_serialize( + _param = self._index_medtronic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171686,7 +172974,7 @@ def index_mediatek_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -171697,7 +172985,7 @@ def index_mediatek_get_without_preload_content( return response_data.response - def _index_mediatek_get_serialize( + def _index_medtronic_get_serialize( self, page, limit, @@ -171857,7 +173145,7 @@ def _index_mediatek_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mediatek', + resource_path='/index/medtronic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -171874,7 +173162,7 @@ def _index_mediatek_get_serialize( @validate_call - def index_medtronic_get( + def index_mendix_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171911,10 +173199,10 @@ def index_medtronic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"medtronic\" + ) -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination: + """Return vulnerability data stored in index \"mendix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` :param page: set the page number of the response :type page: int @@ -171984,7 +173272,7 @@ def index_medtronic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_medtronic_get_serialize( + _param = self._index_mendix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172015,7 +173303,7 @@ def index_medtronic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", '404': "str", '500': "str", } @@ -172031,7 +173319,7 @@ def index_medtronic_get( @validate_call - def index_medtronic_get_with_http_info( + def index_mendix_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172068,10 +173356,10 @@ def index_medtronic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"medtronic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination]: + """Return vulnerability data stored in index \"mendix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` :param page: set the page number of the response :type page: int @@ -172141,7 +173429,7 @@ def index_medtronic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_medtronic_get_serialize( + _param = self._index_mendix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172172,7 +173460,7 @@ def index_medtronic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", '404': "str", '500': "str", } @@ -172188,7 +173476,7 @@ def index_medtronic_get_with_http_info( @validate_call - def index_medtronic_get_without_preload_content( + def index_mendix_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172226,9 +173514,9 @@ def index_medtronic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"medtronic\" + """Return vulnerability data stored in index \"mendix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` :param page: set the page number of the response :type page: int @@ -172298,7 +173586,7 @@ def index_medtronic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_medtronic_get_serialize( + _param = self._index_mendix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172329,7 +173617,7 @@ def index_medtronic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", '404': "str", '500': "str", } @@ -172340,7 +173628,7 @@ def index_medtronic_get_without_preload_content( return response_data.response - def _index_medtronic_get_serialize( + def _index_mendix_get_serialize( self, page, limit, @@ -172500,7 +173788,7 @@ def _index_medtronic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/medtronic', + resource_path='/index/mendix', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -172517,7 +173805,7 @@ def _index_medtronic_get_serialize( @validate_call - def index_mendix_get( + def index_metasploit_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172554,10 +173842,10 @@ def index_mendix_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination: - """Return vulnerability data stored in index \"mendix\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination: + """Return vulnerability data stored in index \"metasploit\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` :param page: set the page number of the response :type page: int @@ -172627,7 +173915,7 @@ def index_mendix_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mendix_get_serialize( + _param = self._index_metasploit_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172658,7 +173946,7 @@ def index_mendix_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", '404': "str", '500': "str", } @@ -172674,7 +173962,7 @@ def index_mendix_get( @validate_call - def index_mendix_get_with_http_info( + def index_metasploit_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172711,10 +173999,10 @@ def index_mendix_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination]: - """Return vulnerability data stored in index \"mendix\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination]: + """Return vulnerability data stored in index \"metasploit\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` :param page: set the page number of the response :type page: int @@ -172784,7 +174072,7 @@ def index_mendix_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mendix_get_serialize( + _param = self._index_metasploit_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172815,7 +174103,7 @@ def index_mendix_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", '404': "str", '500': "str", } @@ -172831,7 +174119,7 @@ def index_mendix_get_with_http_info( @validate_call - def index_mendix_get_without_preload_content( + def index_metasploit_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172869,9 +174157,9 @@ def index_mendix_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mendix\" + """Return vulnerability data stored in index \"metasploit\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` :param page: set the page number of the response :type page: int @@ -172941,7 +174229,7 @@ def index_mendix_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mendix_get_serialize( + _param = self._index_metasploit_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172972,7 +174260,7 @@ def index_mendix_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", '404': "str", '500': "str", } @@ -172983,7 +174271,7 @@ def index_mendix_get_without_preload_content( return response_data.response - def _index_mendix_get_serialize( + def _index_metasploit_get_serialize( self, page, limit, @@ -173143,7 +174431,7 @@ def _index_mendix_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mendix', + resource_path='/index/metasploit', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -173160,7 +174448,7 @@ def _index_mendix_get_serialize( @validate_call - def index_metasploit_get( + def index_microsoft_cvrf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173197,10 +174485,10 @@ def index_metasploit_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination: - """Return vulnerability data stored in index \"metasploit\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination: + """Return vulnerability data stored in index \"microsoft-cvrf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` :param page: set the page number of the response :type page: int @@ -173270,7 +174558,7 @@ def index_metasploit_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_metasploit_get_serialize( + _param = self._index_microsoft_cvrf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173301,7 +174589,7 @@ def index_metasploit_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", '404': "str", '500': "str", } @@ -173317,7 +174605,7 @@ def index_metasploit_get( @validate_call - def index_metasploit_get_with_http_info( + def index_microsoft_cvrf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173354,10 +174642,10 @@ def index_metasploit_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination]: - """Return vulnerability data stored in index \"metasploit\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-cvrf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` :param page: set the page number of the response :type page: int @@ -173427,7 +174715,7 @@ def index_metasploit_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_metasploit_get_serialize( + _param = self._index_microsoft_cvrf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173458,7 +174746,7 @@ def index_metasploit_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", '404': "str", '500': "str", } @@ -173474,7 +174762,7 @@ def index_metasploit_get_with_http_info( @validate_call - def index_metasploit_get_without_preload_content( + def index_microsoft_cvrf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173512,9 +174800,9 @@ def index_metasploit_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"metasploit\" + """Return vulnerability data stored in index \"microsoft-cvrf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` :param page: set the page number of the response :type page: int @@ -173584,7 +174872,7 @@ def index_metasploit_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_metasploit_get_serialize( + _param = self._index_microsoft_cvrf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173615,7 +174903,7 @@ def index_metasploit_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", '404': "str", '500': "str", } @@ -173626,7 +174914,7 @@ def index_metasploit_get_without_preload_content( return response_data.response - def _index_metasploit_get_serialize( + def _index_microsoft_cvrf_get_serialize( self, page, limit, @@ -173786,7 +175074,7 @@ def _index_metasploit_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/metasploit', + resource_path='/index/microsoft-cvrf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -173803,7 +175091,7 @@ def _index_metasploit_get_serialize( @validate_call - def index_microsoft_cvrf_get( + def index_microsoft_driver_block_list_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173840,10 +175128,10 @@ def index_microsoft_cvrf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination: - """Return vulnerability data stored in index \"microsoft-cvrf\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination: + """Return vulnerability data stored in index \"microsoft-driver-block-list\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` :param page: set the page number of the response :type page: int @@ -173913,7 +175201,7 @@ def index_microsoft_cvrf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_cvrf_get_serialize( + _param = self._index_microsoft_driver_block_list_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173944,7 +175232,7 @@ def index_microsoft_cvrf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", '404': "str", '500': "str", } @@ -173960,7 +175248,7 @@ def index_microsoft_cvrf_get( @validate_call - def index_microsoft_cvrf_get_with_http_info( + def index_microsoft_driver_block_list_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173997,10 +175285,10 @@ def index_microsoft_cvrf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-cvrf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-driver-block-list\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` :param page: set the page number of the response :type page: int @@ -174070,7 +175358,7 @@ def index_microsoft_cvrf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_cvrf_get_serialize( + _param = self._index_microsoft_driver_block_list_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174101,7 +175389,7 @@ def index_microsoft_cvrf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", '404': "str", '500': "str", } @@ -174117,7 +175405,7 @@ def index_microsoft_cvrf_get_with_http_info( @validate_call - def index_microsoft_cvrf_get_without_preload_content( + def index_microsoft_driver_block_list_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174155,9 +175443,9 @@ def index_microsoft_cvrf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-cvrf\" + """Return vulnerability data stored in index \"microsoft-driver-block-list\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` :param page: set the page number of the response :type page: int @@ -174227,7 +175515,7 @@ def index_microsoft_cvrf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_cvrf_get_serialize( + _param = self._index_microsoft_driver_block_list_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174258,7 +175546,7 @@ def index_microsoft_cvrf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", '404': "str", '500': "str", } @@ -174269,7 +175557,7 @@ def index_microsoft_cvrf_get_without_preload_content( return response_data.response - def _index_microsoft_cvrf_get_serialize( + def _index_microsoft_driver_block_list_get_serialize( self, page, limit, @@ -174429,7 +175717,7 @@ def _index_microsoft_cvrf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/microsoft-cvrf', + resource_path='/index/microsoft-driver-block-list', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -174446,7 +175734,7 @@ def _index_microsoft_cvrf_get_serialize( @validate_call - def index_microsoft_driver_block_list_get( + def index_microsoft_kb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174483,10 +175771,10 @@ def index_microsoft_driver_block_list_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination: - """Return vulnerability data stored in index \"microsoft-driver-block-list\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination: + """Return vulnerability data stored in index \"microsoft-kb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` :param page: set the page number of the response :type page: int @@ -174556,7 +175844,7 @@ def index_microsoft_driver_block_list_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_driver_block_list_get_serialize( + _param = self._index_microsoft_kb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174587,7 +175875,7 @@ def index_microsoft_driver_block_list_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", '404': "str", '500': "str", } @@ -174603,7 +175891,7 @@ def index_microsoft_driver_block_list_get( @validate_call - def index_microsoft_driver_block_list_get_with_http_info( + def index_microsoft_kb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174640,10 +175928,10 @@ def index_microsoft_driver_block_list_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-driver-block-list\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-kb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` :param page: set the page number of the response :type page: int @@ -174713,7 +176001,7 @@ def index_microsoft_driver_block_list_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_driver_block_list_get_serialize( + _param = self._index_microsoft_kb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174744,7 +176032,7 @@ def index_microsoft_driver_block_list_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", '404': "str", '500': "str", } @@ -174760,7 +176048,7 @@ def index_microsoft_driver_block_list_get_with_http_info( @validate_call - def index_microsoft_driver_block_list_get_without_preload_content( + def index_microsoft_kb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174798,9 +176086,9 @@ def index_microsoft_driver_block_list_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-driver-block-list\" + """Return vulnerability data stored in index \"microsoft-kb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` :param page: set the page number of the response :type page: int @@ -174870,7 +176158,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_driver_block_list_get_serialize( + _param = self._index_microsoft_kb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174901,7 +176189,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", '404': "str", '500': "str", } @@ -174912,7 +176200,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( return response_data.response - def _index_microsoft_driver_block_list_get_serialize( + def _index_microsoft_kb_get_serialize( self, page, limit, @@ -175072,7 +176360,7 @@ def _index_microsoft_driver_block_list_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/microsoft-driver-block-list', + resource_path='/index/microsoft-kb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -175089,7 +176377,7 @@ def _index_microsoft_driver_block_list_get_serialize( @validate_call - def index_microsoft_kb_get( + def index_mikrotik_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175126,10 +176414,10 @@ def index_microsoft_kb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination: - """Return vulnerability data stored in index \"microsoft-kb\" + ) -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination: + """Return vulnerability data stored in index \"mikrotik\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` :param page: set the page number of the response :type page: int @@ -175199,7 +176487,7 @@ def index_microsoft_kb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_kb_get_serialize( + _param = self._index_mikrotik_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175230,7 +176518,7 @@ def index_microsoft_kb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", '404': "str", '500': "str", } @@ -175246,7 +176534,7 @@ def index_microsoft_kb_get( @validate_call - def index_microsoft_kb_get_with_http_info( + def index_mikrotik_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175283,10 +176571,10 @@ def index_microsoft_kb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-kb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination]: + """Return vulnerability data stored in index \"mikrotik\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` :param page: set the page number of the response :type page: int @@ -175356,7 +176644,7 @@ def index_microsoft_kb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_kb_get_serialize( + _param = self._index_mikrotik_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175387,7 +176675,7 @@ def index_microsoft_kb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", '404': "str", '500': "str", } @@ -175403,7 +176691,7 @@ def index_microsoft_kb_get_with_http_info( @validate_call - def index_microsoft_kb_get_without_preload_content( + def index_mikrotik_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175441,9 +176729,9 @@ def index_microsoft_kb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-kb\" + """Return vulnerability data stored in index \"mikrotik\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` :param page: set the page number of the response :type page: int @@ -175513,7 +176801,7 @@ def index_microsoft_kb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_kb_get_serialize( + _param = self._index_mikrotik_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175544,7 +176832,7 @@ def index_microsoft_kb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", '404': "str", '500': "str", } @@ -175555,7 +176843,7 @@ def index_microsoft_kb_get_without_preload_content( return response_data.response - def _index_microsoft_kb_get_serialize( + def _index_mikrotik_get_serialize( self, page, limit, @@ -175715,7 +177003,7 @@ def _index_microsoft_kb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/microsoft-kb', + resource_path='/index/mikrotik', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -175732,7 +177020,7 @@ def _index_microsoft_kb_get_serialize( @validate_call - def index_mikrotik_get( + def index_mindray_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175769,10 +177057,10 @@ def index_mikrotik_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination: - """Return vulnerability data stored in index \"mikrotik\" + ) -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination: + """Return vulnerability data stored in index \"mindray\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` :param page: set the page number of the response :type page: int @@ -175842,7 +177130,7 @@ def index_mikrotik_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mikrotik_get_serialize( + _param = self._index_mindray_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175873,7 +177161,7 @@ def index_mikrotik_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", '404': "str", '500': "str", } @@ -175889,7 +177177,7 @@ def index_mikrotik_get( @validate_call - def index_mikrotik_get_with_http_info( + def index_mindray_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175926,10 +177214,10 @@ def index_mikrotik_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination]: - """Return vulnerability data stored in index \"mikrotik\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination]: + """Return vulnerability data stored in index \"mindray\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` :param page: set the page number of the response :type page: int @@ -175999,7 +177287,7 @@ def index_mikrotik_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mikrotik_get_serialize( + _param = self._index_mindray_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176030,7 +177318,7 @@ def index_mikrotik_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", '404': "str", '500': "str", } @@ -176046,7 +177334,7 @@ def index_mikrotik_get_with_http_info( @validate_call - def index_mikrotik_get_without_preload_content( + def index_mindray_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176084,9 +177372,9 @@ def index_mikrotik_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mikrotik\" + """Return vulnerability data stored in index \"mindray\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` :param page: set the page number of the response :type page: int @@ -176156,7 +177444,7 @@ def index_mikrotik_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mikrotik_get_serialize( + _param = self._index_mindray_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176187,7 +177475,7 @@ def index_mikrotik_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", '404': "str", '500': "str", } @@ -176198,7 +177486,7 @@ def index_mikrotik_get_without_preload_content( return response_data.response - def _index_mikrotik_get_serialize( + def _index_mindray_get_serialize( self, page, limit, @@ -176358,7 +177646,7 @@ def _index_mikrotik_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mikrotik', + resource_path='/index/mindray', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -176375,7 +177663,7 @@ def _index_mikrotik_get_serialize( @validate_call - def index_mindray_get( + def index_misp_threat_actors_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176412,10 +177700,10 @@ def index_mindray_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination: - """Return vulnerability data stored in index \"mindray\" + ) -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination: + """Return vulnerability data stored in index \"misp-threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -176485,7 +177773,7 @@ def index_mindray_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mindray_get_serialize( + _param = self._index_misp_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176516,7 +177804,7 @@ def index_mindray_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", '404': "str", '500': "str", } @@ -176532,7 +177820,7 @@ def index_mindray_get( @validate_call - def index_mindray_get_with_http_info( + def index_misp_threat_actors_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176569,10 +177857,10 @@ def index_mindray_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination]: - """Return vulnerability data stored in index \"mindray\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination]: + """Return vulnerability data stored in index \"misp-threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -176642,7 +177930,7 @@ def index_mindray_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mindray_get_serialize( + _param = self._index_misp_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176673,7 +177961,7 @@ def index_mindray_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", '404': "str", '500': "str", } @@ -176689,7 +177977,7 @@ def index_mindray_get_with_http_info( @validate_call - def index_mindray_get_without_preload_content( + def index_misp_threat_actors_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176727,9 +178015,9 @@ def index_mindray_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mindray\" + """Return vulnerability data stored in index \"misp-threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -176799,7 +178087,7 @@ def index_mindray_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mindray_get_serialize( + _param = self._index_misp_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176830,7 +178118,7 @@ def index_mindray_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", '404': "str", '500': "str", } @@ -176841,7 +178129,7 @@ def index_mindray_get_without_preload_content( return response_data.response - def _index_mindray_get_serialize( + def _index_misp_threat_actors_get_serialize( self, page, limit, @@ -177001,7 +178289,7 @@ def _index_mindray_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mindray', + resource_path='/index/misp-threat-actors', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -177018,7 +178306,7 @@ def _index_mindray_get_serialize( @validate_call - def index_misp_threat_actors_get( + def index_mitel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177055,10 +178343,10 @@ def index_misp_threat_actors_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination: - """Return vulnerability data stored in index \"misp-threat-actors\" + ) -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination: + """Return vulnerability data stored in index \"mitel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` :param page: set the page number of the response :type page: int @@ -177128,7 +178416,7 @@ def index_misp_threat_actors_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_misp_threat_actors_get_serialize( + _param = self._index_mitel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177159,7 +178447,7 @@ def index_misp_threat_actors_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", '404': "str", '500': "str", } @@ -177175,7 +178463,7 @@ def index_misp_threat_actors_get( @validate_call - def index_misp_threat_actors_get_with_http_info( + def index_mitel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177212,10 +178500,10 @@ def index_misp_threat_actors_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination]: - """Return vulnerability data stored in index \"misp-threat-actors\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination]: + """Return vulnerability data stored in index \"mitel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` :param page: set the page number of the response :type page: int @@ -177285,7 +178573,7 @@ def index_misp_threat_actors_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_misp_threat_actors_get_serialize( + _param = self._index_mitel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177316,7 +178604,7 @@ def index_misp_threat_actors_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", '404': "str", '500': "str", } @@ -177332,7 +178620,7 @@ def index_misp_threat_actors_get_with_http_info( @validate_call - def index_misp_threat_actors_get_without_preload_content( + def index_mitel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177370,9 +178658,9 @@ def index_misp_threat_actors_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"misp-threat-actors\" + """Return vulnerability data stored in index \"mitel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` :param page: set the page number of the response :type page: int @@ -177442,7 +178730,7 @@ def index_misp_threat_actors_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_misp_threat_actors_get_serialize( + _param = self._index_mitel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177473,7 +178761,7 @@ def index_misp_threat_actors_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", '404': "str", '500': "str", } @@ -177484,7 +178772,7 @@ def index_misp_threat_actors_get_without_preload_content( return response_data.response - def _index_misp_threat_actors_get_serialize( + def _index_mitel_get_serialize( self, page, limit, @@ -177644,7 +178932,7 @@ def _index_misp_threat_actors_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/misp-threat-actors', + resource_path='/index/mitel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -177661,7 +178949,7 @@ def _index_misp_threat_actors_get_serialize( @validate_call - def index_mitel_get( + def index_mitre_attack_cve_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177698,10 +178986,10 @@ def index_mitel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination: - """Return vulnerability data stored in index \"mitel\" + ) -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination: + """Return vulnerability data stored in index \"mitre-attack-cve\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` :param page: set the page number of the response :type page: int @@ -177771,7 +179059,7 @@ def index_mitel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitel_get_serialize( + _param = self._index_mitre_attack_cve_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177802,7 +179090,7 @@ def index_mitel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", '404': "str", '500': "str", } @@ -177818,7 +179106,7 @@ def index_mitel_get( @validate_call - def index_mitel_get_with_http_info( + def index_mitre_attack_cve_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177855,10 +179143,10 @@ def index_mitel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination]: - """Return vulnerability data stored in index \"mitel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination]: + """Return vulnerability data stored in index \"mitre-attack-cve\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` :param page: set the page number of the response :type page: int @@ -177928,7 +179216,7 @@ def index_mitel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitel_get_serialize( + _param = self._index_mitre_attack_cve_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177959,7 +179247,7 @@ def index_mitel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", '404': "str", '500': "str", } @@ -177975,7 +179263,7 @@ def index_mitel_get_with_http_info( @validate_call - def index_mitel_get_without_preload_content( + def index_mitre_attack_cve_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178013,9 +179301,9 @@ def index_mitel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitel\" + """Return vulnerability data stored in index \"mitre-attack-cve\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` :param page: set the page number of the response :type page: int @@ -178085,7 +179373,7 @@ def index_mitel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitel_get_serialize( + _param = self._index_mitre_attack_cve_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178116,7 +179404,7 @@ def index_mitel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", '404': "str", '500': "str", } @@ -178127,7 +179415,7 @@ def index_mitel_get_without_preload_content( return response_data.response - def _index_mitel_get_serialize( + def _index_mitre_attack_cve_get_serialize( self, page, limit, @@ -178287,7 +179575,7 @@ def _index_mitel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mitel', + resource_path='/index/mitre-attack-cve', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -178304,7 +179592,7 @@ def _index_mitel_get_serialize( @validate_call - def index_mitre_attack_cve_get( + def index_mitre_cvelist_v5_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178341,10 +179629,10 @@ def index_mitre_attack_cve_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination: - """Return vulnerability data stored in index \"mitre-attack-cve\" + ) -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination: + """Return vulnerability data stored in index \"mitre-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -178414,7 +179702,7 @@ def index_mitre_attack_cve_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_attack_cve_get_serialize( + _param = self._index_mitre_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178445,7 +179733,7 @@ def index_mitre_attack_cve_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -178461,7 +179749,7 @@ def index_mitre_attack_cve_get( @validate_call - def index_mitre_attack_cve_get_with_http_info( + def index_mitre_cvelist_v5_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178498,10 +179786,10 @@ def index_mitre_attack_cve_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination]: - """Return vulnerability data stored in index \"mitre-attack-cve\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination]: + """Return vulnerability data stored in index \"mitre-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -178571,7 +179859,7 @@ def index_mitre_attack_cve_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_attack_cve_get_serialize( + _param = self._index_mitre_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178602,7 +179890,7 @@ def index_mitre_attack_cve_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -178618,7 +179906,7 @@ def index_mitre_attack_cve_get_with_http_info( @validate_call - def index_mitre_attack_cve_get_without_preload_content( + def index_mitre_cvelist_v5_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178656,9 +179944,9 @@ def index_mitre_attack_cve_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitre-attack-cve\" + """Return vulnerability data stored in index \"mitre-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -178728,7 +180016,7 @@ def index_mitre_attack_cve_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_attack_cve_get_serialize( + _param = self._index_mitre_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178759,7 +180047,7 @@ def index_mitre_attack_cve_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -178770,7 +180058,7 @@ def index_mitre_attack_cve_get_without_preload_content( return response_data.response - def _index_mitre_attack_cve_get_serialize( + def _index_mitre_cvelist_v5_get_serialize( self, page, limit, @@ -178930,7 +180218,7 @@ def _index_mitre_attack_cve_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mitre-attack-cve', + resource_path='/index/mitre-cvelist-v5', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -178947,7 +180235,7 @@ def _index_mitre_attack_cve_get_serialize( @validate_call - def index_mitre_cvelist_v5_get( + def index_mitsubishi_electric_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178984,10 +180272,10 @@ def index_mitre_cvelist_v5_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination: - """Return vulnerability data stored in index \"mitre-cvelist-v5\" + ) -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"mitsubishi-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` :param page: set the page number of the response :type page: int @@ -179057,7 +180345,7 @@ def index_mitre_cvelist_v5_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_cvelist_v5_get_serialize( + _param = self._index_mitsubishi_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179088,7 +180376,7 @@ def index_mitre_cvelist_v5_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -179104,7 +180392,7 @@ def index_mitre_cvelist_v5_get( @validate_call - def index_mitre_cvelist_v5_get_with_http_info( + def index_mitsubishi_electric_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179141,10 +180429,10 @@ def index_mitre_cvelist_v5_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination]: - """Return vulnerability data stored in index \"mitre-cvelist-v5\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"mitsubishi-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` :param page: set the page number of the response :type page: int @@ -179214,7 +180502,7 @@ def index_mitre_cvelist_v5_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_cvelist_v5_get_serialize( + _param = self._index_mitsubishi_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179245,7 +180533,7 @@ def index_mitre_cvelist_v5_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -179261,7 +180549,7 @@ def index_mitre_cvelist_v5_get_with_http_info( @validate_call - def index_mitre_cvelist_v5_get_without_preload_content( + def index_mitsubishi_electric_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179299,9 +180587,9 @@ def index_mitre_cvelist_v5_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitre-cvelist-v5\" + """Return vulnerability data stored in index \"mitsubishi-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` :param page: set the page number of the response :type page: int @@ -179371,7 +180659,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_cvelist_v5_get_serialize( + _param = self._index_mitsubishi_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179402,7 +180690,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -179413,7 +180701,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( return response_data.response - def _index_mitre_cvelist_v5_get_serialize( + def _index_mitsubishi_electric_get_serialize( self, page, limit, @@ -179573,7 +180861,7 @@ def _index_mitre_cvelist_v5_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mitre-cvelist-v5', + resource_path='/index/mitsubishi-electric', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -179590,7 +180878,7 @@ def _index_mitre_cvelist_v5_get_serialize( @validate_call - def index_mitsubishi_electric_get( + def index_mongodb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179627,10 +180915,10 @@ def index_mitsubishi_electric_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"mitsubishi-electric\" + ) -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination: + """Return vulnerability data stored in index \"mongodb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` :param page: set the page number of the response :type page: int @@ -179700,7 +180988,7 @@ def index_mitsubishi_electric_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitsubishi_electric_get_serialize( + _param = self._index_mongodb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179731,7 +181019,7 @@ def index_mitsubishi_electric_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", '404': "str", '500': "str", } @@ -179747,7 +181035,7 @@ def index_mitsubishi_electric_get( @validate_call - def index_mitsubishi_electric_get_with_http_info( + def index_mongodb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179784,10 +181072,10 @@ def index_mitsubishi_electric_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"mitsubishi-electric\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination]: + """Return vulnerability data stored in index \"mongodb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` :param page: set the page number of the response :type page: int @@ -179857,7 +181145,7 @@ def index_mitsubishi_electric_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitsubishi_electric_get_serialize( + _param = self._index_mongodb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179888,7 +181176,7 @@ def index_mitsubishi_electric_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", '404': "str", '500': "str", } @@ -179904,7 +181192,7 @@ def index_mitsubishi_electric_get_with_http_info( @validate_call - def index_mitsubishi_electric_get_without_preload_content( + def index_mongodb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179942,9 +181230,9 @@ def index_mitsubishi_electric_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitsubishi-electric\" + """Return vulnerability data stored in index \"mongodb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` :param page: set the page number of the response :type page: int @@ -180014,7 +181302,7 @@ def index_mitsubishi_electric_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitsubishi_electric_get_serialize( + _param = self._index_mongodb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180045,7 +181333,7 @@ def index_mitsubishi_electric_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", '404': "str", '500': "str", } @@ -180056,7 +181344,7 @@ def index_mitsubishi_electric_get_without_preload_content( return response_data.response - def _index_mitsubishi_electric_get_serialize( + def _index_mongodb_get_serialize( self, page, limit, @@ -180216,7 +181504,7 @@ def _index_mitsubishi_electric_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mitsubishi-electric', + resource_path='/index/mongodb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -180233,7 +181521,7 @@ def _index_mitsubishi_electric_get_serialize( @validate_call - def index_mongodb_get( + def index_moxa_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180270,10 +181558,10 @@ def index_mongodb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination: - """Return vulnerability data stored in index \"mongodb\" + ) -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"moxa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` :param page: set the page number of the response :type page: int @@ -180343,7 +181631,7 @@ def index_mongodb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mongodb_get_serialize( + _param = self._index_moxa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180374,7 +181662,7 @@ def index_mongodb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -180390,7 +181678,7 @@ def index_mongodb_get( @validate_call - def index_mongodb_get_with_http_info( + def index_moxa_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180427,10 +181715,10 @@ def index_mongodb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination]: - """Return vulnerability data stored in index \"mongodb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"moxa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` :param page: set the page number of the response :type page: int @@ -180500,7 +181788,7 @@ def index_mongodb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mongodb_get_serialize( + _param = self._index_moxa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180531,7 +181819,7 @@ def index_mongodb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -180547,7 +181835,7 @@ def index_mongodb_get_with_http_info( @validate_call - def index_mongodb_get_without_preload_content( + def index_moxa_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180585,9 +181873,9 @@ def index_mongodb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mongodb\" + """Return vulnerability data stored in index \"moxa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` :param page: set the page number of the response :type page: int @@ -180657,7 +181945,7 @@ def index_mongodb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mongodb_get_serialize( + _param = self._index_moxa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180688,7 +181976,7 @@ def index_mongodb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -180699,7 +181987,7 @@ def index_mongodb_get_without_preload_content( return response_data.response - def _index_mongodb_get_serialize( + def _index_moxa_get_serialize( self, page, limit, @@ -180859,7 +182147,7 @@ def _index_mongodb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mongodb', + resource_path='/index/moxa', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -180876,7 +182164,7 @@ def _index_mongodb_get_serialize( @validate_call - def index_moxa_get( + def index_mozilla_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180913,10 +182201,10 @@ def index_moxa_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"moxa\" + ) -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"mozilla\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` :param page: set the page number of the response :type page: int @@ -180986,7 +182274,7 @@ def index_moxa_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_moxa_get_serialize( + _param = self._index_mozilla_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181017,7 +182305,7 @@ def index_moxa_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -181033,7 +182321,7 @@ def index_moxa_get( @validate_call - def index_moxa_get_with_http_info( + def index_mozilla_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181070,10 +182358,10 @@ def index_moxa_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"moxa\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"mozilla\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` :param page: set the page number of the response :type page: int @@ -181143,7 +182431,7 @@ def index_moxa_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_moxa_get_serialize( + _param = self._index_mozilla_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181174,7 +182462,7 @@ def index_moxa_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -181190,7 +182478,7 @@ def index_moxa_get_with_http_info( @validate_call - def index_moxa_get_without_preload_content( + def index_mozilla_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181228,9 +182516,9 @@ def index_moxa_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"moxa\" + """Return vulnerability data stored in index \"mozilla\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` :param page: set the page number of the response :type page: int @@ -181300,7 +182588,7 @@ def index_moxa_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_moxa_get_serialize( + _param = self._index_mozilla_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181331,7 +182619,7 @@ def index_moxa_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -181342,7 +182630,7 @@ def index_moxa_get_without_preload_content( return response_data.response - def _index_moxa_get_serialize( + def _index_mozilla_get_serialize( self, page, limit, @@ -181502,7 +182790,7 @@ def _index_moxa_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/moxa', + resource_path='/index/mozilla', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -181519,7 +182807,7 @@ def _index_moxa_get_serialize( @validate_call - def index_mozilla_get( + def index_naver_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181556,10 +182844,10 @@ def index_mozilla_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"mozilla\" + ) -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination: + """Return vulnerability data stored in index \"naver\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` :param page: set the page number of the response :type page: int @@ -181629,7 +182917,7 @@ def index_mozilla_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mozilla_get_serialize( + _param = self._index_naver_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181660,7 +182948,7 @@ def index_mozilla_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", '404': "str", '500': "str", } @@ -181676,7 +182964,7 @@ def index_mozilla_get( @validate_call - def index_mozilla_get_with_http_info( + def index_naver_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181713,10 +183001,10 @@ def index_mozilla_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"mozilla\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination]: + """Return vulnerability data stored in index \"naver\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` :param page: set the page number of the response :type page: int @@ -181786,7 +183074,7 @@ def index_mozilla_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mozilla_get_serialize( + _param = self._index_naver_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181817,7 +183105,7 @@ def index_mozilla_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", '404': "str", '500': "str", } @@ -181833,7 +183121,7 @@ def index_mozilla_get_with_http_info( @validate_call - def index_mozilla_get_without_preload_content( + def index_naver_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181871,9 +183159,9 @@ def index_mozilla_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mozilla\" + """Return vulnerability data stored in index \"naver\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` :param page: set the page number of the response :type page: int @@ -181943,7 +183231,7 @@ def index_mozilla_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mozilla_get_serialize( + _param = self._index_naver_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181974,7 +183262,7 @@ def index_mozilla_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", '404': "str", '500': "str", } @@ -181985,7 +183273,7 @@ def index_mozilla_get_without_preload_content( return response_data.response - def _index_mozilla_get_serialize( + def _index_naver_get_serialize( self, page, limit, @@ -182145,7 +183433,7 @@ def _index_mozilla_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/mozilla', + resource_path='/index/naver', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -182162,7 +183450,7 @@ def _index_mozilla_get_serialize( @validate_call - def index_naver_get( + def index_ncsc_cves_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182199,10 +183487,10 @@ def index_naver_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination: - """Return vulnerability data stored in index \"naver\" + ) -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination: + """Return vulnerability data stored in index \"ncsc-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` :param page: set the page number of the response :type page: int @@ -182272,7 +183560,7 @@ def index_naver_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_naver_get_serialize( + _param = self._index_ncsc_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182303,7 +183591,7 @@ def index_naver_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", '404': "str", '500': "str", } @@ -182319,7 +183607,7 @@ def index_naver_get( @validate_call - def index_naver_get_with_http_info( + def index_ncsc_cves_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182356,10 +183644,10 @@ def index_naver_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination]: - """Return vulnerability data stored in index \"naver\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination]: + """Return vulnerability data stored in index \"ncsc-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` :param page: set the page number of the response :type page: int @@ -182429,7 +183717,7 @@ def index_naver_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_naver_get_serialize( + _param = self._index_ncsc_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182460,7 +183748,7 @@ def index_naver_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", '404': "str", '500': "str", } @@ -182476,7 +183764,7 @@ def index_naver_get_with_http_info( @validate_call - def index_naver_get_without_preload_content( + def index_ncsc_cves_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182514,9 +183802,9 @@ def index_naver_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"naver\" + """Return vulnerability data stored in index \"ncsc-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` :param page: set the page number of the response :type page: int @@ -182586,7 +183874,7 @@ def index_naver_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_naver_get_serialize( + _param = self._index_ncsc_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182617,7 +183905,7 @@ def index_naver_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", '404': "str", '500': "str", } @@ -182628,7 +183916,7 @@ def index_naver_get_without_preload_content( return response_data.response - def _index_naver_get_serialize( + def _index_ncsc_cves_get_serialize( self, page, limit, @@ -182788,7 +184076,7 @@ def _index_naver_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/naver', + resource_path='/index/ncsc-cves', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -182805,7 +184093,7 @@ def _index_naver_get_serialize( @validate_call - def index_ncsc_cves_get( + def index_ncsc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182842,10 +184130,10 @@ def index_ncsc_cves_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination: - """Return vulnerability data stored in index \"ncsc-cves\" + ) -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination: + """Return vulnerability data stored in index \"ncsc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` :param page: set the page number of the response :type page: int @@ -182915,7 +184203,7 @@ def index_ncsc_cves_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_cves_get_serialize( + _param = self._index_ncsc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182946,7 +184234,7 @@ def index_ncsc_cves_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", '404': "str", '500': "str", } @@ -182962,7 +184250,7 @@ def index_ncsc_cves_get( @validate_call - def index_ncsc_cves_get_with_http_info( + def index_ncsc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182999,10 +184287,10 @@ def index_ncsc_cves_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination]: - """Return vulnerability data stored in index \"ncsc-cves\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination]: + """Return vulnerability data stored in index \"ncsc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` :param page: set the page number of the response :type page: int @@ -183072,7 +184360,7 @@ def index_ncsc_cves_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_cves_get_serialize( + _param = self._index_ncsc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183103,7 +184391,7 @@ def index_ncsc_cves_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", '404': "str", '500': "str", } @@ -183119,7 +184407,7 @@ def index_ncsc_cves_get_with_http_info( @validate_call - def index_ncsc_cves_get_without_preload_content( + def index_ncsc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183157,9 +184445,9 @@ def index_ncsc_cves_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ncsc-cves\" + """Return vulnerability data stored in index \"ncsc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` :param page: set the page number of the response :type page: int @@ -183229,7 +184517,7 @@ def index_ncsc_cves_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_cves_get_serialize( + _param = self._index_ncsc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183260,7 +184548,7 @@ def index_ncsc_cves_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", '404': "str", '500': "str", } @@ -183271,7 +184559,7 @@ def index_ncsc_cves_get_without_preload_content( return response_data.response - def _index_ncsc_cves_get_serialize( + def _index_ncsc_get_serialize( self, page, limit, @@ -183431,7 +184719,7 @@ def _index_ncsc_cves_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ncsc-cves', + resource_path='/index/ncsc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -183448,7 +184736,7 @@ def _index_ncsc_cves_get_serialize( @validate_call - def index_ncsc_get( + def index_nec_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183485,10 +184773,10 @@ def index_ncsc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination: - """Return vulnerability data stored in index \"ncsc\" + ) -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination: + """Return vulnerability data stored in index \"nec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` :param page: set the page number of the response :type page: int @@ -183558,7 +184846,7 @@ def index_ncsc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_get_serialize( + _param = self._index_nec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183589,7 +184877,7 @@ def index_ncsc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", '404': "str", '500': "str", } @@ -183605,7 +184893,7 @@ def index_ncsc_get( @validate_call - def index_ncsc_get_with_http_info( + def index_nec_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183642,10 +184930,10 @@ def index_ncsc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination]: - """Return vulnerability data stored in index \"ncsc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination]: + """Return vulnerability data stored in index \"nec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` :param page: set the page number of the response :type page: int @@ -183715,7 +185003,7 @@ def index_ncsc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_get_serialize( + _param = self._index_nec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183746,7 +185034,7 @@ def index_ncsc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", '404': "str", '500': "str", } @@ -183762,7 +185050,7 @@ def index_ncsc_get_with_http_info( @validate_call - def index_ncsc_get_without_preload_content( + def index_nec_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183800,9 +185088,9 @@ def index_ncsc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ncsc\" + """Return vulnerability data stored in index \"nec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` :param page: set the page number of the response :type page: int @@ -183872,7 +185160,7 @@ def index_ncsc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_get_serialize( + _param = self._index_nec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183903,7 +185191,7 @@ def index_ncsc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", '404': "str", '500': "str", } @@ -183914,7 +185202,7 @@ def index_ncsc_get_without_preload_content( return response_data.response - def _index_ncsc_get_serialize( + def _index_nec_get_serialize( self, page, limit, @@ -184074,7 +185362,7 @@ def _index_ncsc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ncsc', + resource_path='/index/nec', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -184091,7 +185379,7 @@ def _index_ncsc_get_serialize( @validate_call - def index_nec_get( + def index_nessus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184128,10 +185416,10 @@ def index_nec_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination: - """Return vulnerability data stored in index \"nec\" + ) -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination: + """Return vulnerability data stored in index \"nessus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` :param page: set the page number of the response :type page: int @@ -184201,7 +185489,7 @@ def index_nec_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nec_get_serialize( + _param = self._index_nessus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184232,7 +185520,7 @@ def index_nec_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", '404': "str", '500': "str", } @@ -184248,7 +185536,7 @@ def index_nec_get( @validate_call - def index_nec_get_with_http_info( + def index_nessus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184285,10 +185573,10 @@ def index_nec_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination]: - """Return vulnerability data stored in index \"nec\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination]: + """Return vulnerability data stored in index \"nessus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` :param page: set the page number of the response :type page: int @@ -184358,7 +185646,7 @@ def index_nec_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nec_get_serialize( + _param = self._index_nessus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184389,7 +185677,7 @@ def index_nec_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", '404': "str", '500': "str", } @@ -184405,7 +185693,7 @@ def index_nec_get_with_http_info( @validate_call - def index_nec_get_without_preload_content( + def index_nessus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184443,9 +185731,9 @@ def index_nec_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nec\" + """Return vulnerability data stored in index \"nessus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` :param page: set the page number of the response :type page: int @@ -184515,7 +185803,7 @@ def index_nec_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nec_get_serialize( + _param = self._index_nessus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184546,7 +185834,7 @@ def index_nec_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", '404': "str", '500': "str", } @@ -184557,7 +185845,7 @@ def index_nec_get_without_preload_content( return response_data.response - def _index_nec_get_serialize( + def _index_nessus_get_serialize( self, page, limit, @@ -184717,7 +186005,7 @@ def _index_nec_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nec', + resource_path='/index/nessus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -184734,7 +186022,7 @@ def _index_nec_get_serialize( @validate_call - def index_nessus_get( + def index_netapp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184771,10 +186059,10 @@ def index_nessus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination: - """Return vulnerability data stored in index \"nessus\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination: + """Return vulnerability data stored in index \"netapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` :param page: set the page number of the response :type page: int @@ -184844,7 +186132,7 @@ def index_nessus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nessus_get_serialize( + _param = self._index_netapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184875,7 +186163,7 @@ def index_nessus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", '404': "str", '500': "str", } @@ -184891,7 +186179,7 @@ def index_nessus_get( @validate_call - def index_nessus_get_with_http_info( + def index_netapp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184928,10 +186216,10 @@ def index_nessus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination]: - """Return vulnerability data stored in index \"nessus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination]: + """Return vulnerability data stored in index \"netapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` :param page: set the page number of the response :type page: int @@ -185001,7 +186289,7 @@ def index_nessus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nessus_get_serialize( + _param = self._index_netapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185032,7 +186320,7 @@ def index_nessus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", '404': "str", '500': "str", } @@ -185048,7 +186336,7 @@ def index_nessus_get_with_http_info( @validate_call - def index_nessus_get_without_preload_content( + def index_netapp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185086,9 +186374,9 @@ def index_nessus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nessus\" + """Return vulnerability data stored in index \"netapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` :param page: set the page number of the response :type page: int @@ -185158,7 +186446,7 @@ def index_nessus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nessus_get_serialize( + _param = self._index_netapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185189,7 +186477,7 @@ def index_nessus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", '404': "str", '500': "str", } @@ -185200,7 +186488,7 @@ def index_nessus_get_without_preload_content( return response_data.response - def _index_nessus_get_serialize( + def _index_netapp_get_serialize( self, page, limit, @@ -185360,7 +186648,7 @@ def _index_nessus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nessus', + resource_path='/index/netapp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -185377,7 +186665,7 @@ def _index_nessus_get_serialize( @validate_call - def index_netapp_get( + def index_netatalk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185414,10 +186702,10 @@ def index_netapp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination: - """Return vulnerability data stored in index \"netapp\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination: + """Return vulnerability data stored in index \"netatalk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` :param page: set the page number of the response :type page: int @@ -185487,7 +186775,7 @@ def index_netapp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netapp_get_serialize( + _param = self._index_netatalk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185518,7 +186806,7 @@ def index_netapp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", '404': "str", '500': "str", } @@ -185534,7 +186822,7 @@ def index_netapp_get( @validate_call - def index_netapp_get_with_http_info( + def index_netatalk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185571,10 +186859,10 @@ def index_netapp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination]: - """Return vulnerability data stored in index \"netapp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination]: + """Return vulnerability data stored in index \"netatalk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` :param page: set the page number of the response :type page: int @@ -185644,7 +186932,7 @@ def index_netapp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netapp_get_serialize( + _param = self._index_netatalk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185675,7 +186963,7 @@ def index_netapp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", '404': "str", '500': "str", } @@ -185691,7 +186979,7 @@ def index_netapp_get_with_http_info( @validate_call - def index_netapp_get_without_preload_content( + def index_netatalk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185729,9 +187017,9 @@ def index_netapp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netapp\" + """Return vulnerability data stored in index \"netatalk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` :param page: set the page number of the response :type page: int @@ -185801,7 +187089,7 @@ def index_netapp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netapp_get_serialize( + _param = self._index_netatalk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185832,7 +187120,7 @@ def index_netapp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", '404': "str", '500': "str", } @@ -185843,7 +187131,7 @@ def index_netapp_get_without_preload_content( return response_data.response - def _index_netapp_get_serialize( + def _index_netatalk_get_serialize( self, page, limit, @@ -186003,7 +187291,7 @@ def _index_netapp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/netapp', + resource_path='/index/netatalk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -186020,7 +187308,7 @@ def _index_netapp_get_serialize( @validate_call - def index_netatalk_get( + def index_netgate_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186057,10 +187345,10 @@ def index_netatalk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination: - """Return vulnerability data stored in index \"netatalk\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination: + """Return vulnerability data stored in index \"netgate\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` :param page: set the page number of the response :type page: int @@ -186130,7 +187418,7 @@ def index_netatalk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netatalk_get_serialize( + _param = self._index_netgate_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186161,7 +187449,7 @@ def index_netatalk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", '404': "str", '500': "str", } @@ -186177,7 +187465,7 @@ def index_netatalk_get( @validate_call - def index_netatalk_get_with_http_info( + def index_netgate_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186214,10 +187502,10 @@ def index_netatalk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination]: - """Return vulnerability data stored in index \"netatalk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination]: + """Return vulnerability data stored in index \"netgate\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` :param page: set the page number of the response :type page: int @@ -186287,7 +187575,7 @@ def index_netatalk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netatalk_get_serialize( + _param = self._index_netgate_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186318,7 +187606,7 @@ def index_netatalk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", '404': "str", '500': "str", } @@ -186334,7 +187622,7 @@ def index_netatalk_get_with_http_info( @validate_call - def index_netatalk_get_without_preload_content( + def index_netgate_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186372,9 +187660,9 @@ def index_netatalk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netatalk\" + """Return vulnerability data stored in index \"netgate\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` :param page: set the page number of the response :type page: int @@ -186444,7 +187732,7 @@ def index_netatalk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netatalk_get_serialize( + _param = self._index_netgate_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186475,7 +187763,7 @@ def index_netatalk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", '404': "str", '500': "str", } @@ -186486,7 +187774,7 @@ def index_netatalk_get_without_preload_content( return response_data.response - def _index_netatalk_get_serialize( + def _index_netgate_get_serialize( self, page, limit, @@ -186646,7 +187934,7 @@ def _index_netatalk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/netatalk', + resource_path='/index/netgate', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -186663,7 +187951,7 @@ def _index_netatalk_get_serialize( @validate_call - def index_netgate_get( + def index_netgear_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186700,10 +187988,10 @@ def index_netgate_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination: - """Return vulnerability data stored in index \"netgate\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination: + """Return vulnerability data stored in index \"netgear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` :param page: set the page number of the response :type page: int @@ -186773,7 +188061,7 @@ def index_netgate_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgate_get_serialize( + _param = self._index_netgear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186804,7 +188092,7 @@ def index_netgate_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", '404': "str", '500': "str", } @@ -186820,7 +188108,7 @@ def index_netgate_get( @validate_call - def index_netgate_get_with_http_info( + def index_netgear_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186857,10 +188145,10 @@ def index_netgate_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination]: - """Return vulnerability data stored in index \"netgate\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination]: + """Return vulnerability data stored in index \"netgear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` :param page: set the page number of the response :type page: int @@ -186930,7 +188218,7 @@ def index_netgate_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgate_get_serialize( + _param = self._index_netgear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186961,7 +188249,7 @@ def index_netgate_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", '404': "str", '500': "str", } @@ -186977,7 +188265,7 @@ def index_netgate_get_with_http_info( @validate_call - def index_netgate_get_without_preload_content( + def index_netgear_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187015,9 +188303,9 @@ def index_netgate_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netgate\" + """Return vulnerability data stored in index \"netgear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` :param page: set the page number of the response :type page: int @@ -187087,7 +188375,7 @@ def index_netgate_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgate_get_serialize( + _param = self._index_netgear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187118,7 +188406,7 @@ def index_netgate_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", '404': "str", '500': "str", } @@ -187129,7 +188417,7 @@ def index_netgate_get_without_preload_content( return response_data.response - def _index_netgate_get_serialize( + def _index_netgear_get_serialize( self, page, limit, @@ -187289,7 +188577,7 @@ def _index_netgate_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/netgate', + resource_path='/index/netgear', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -187306,7 +188594,7 @@ def _index_netgate_get_serialize( @validate_call - def index_netgear_get( + def index_netskope_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187343,10 +188631,10 @@ def index_netgear_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination: - """Return vulnerability data stored in index \"netgear\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination: + """Return vulnerability data stored in index \"netskope\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` :param page: set the page number of the response :type page: int @@ -187416,7 +188704,7 @@ def index_netgear_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgear_get_serialize( + _param = self._index_netskope_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187447,7 +188735,7 @@ def index_netgear_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", '404': "str", '500': "str", } @@ -187463,7 +188751,7 @@ def index_netgear_get( @validate_call - def index_netgear_get_with_http_info( + def index_netskope_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187500,10 +188788,10 @@ def index_netgear_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination]: - """Return vulnerability data stored in index \"netgear\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination]: + """Return vulnerability data stored in index \"netskope\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` :param page: set the page number of the response :type page: int @@ -187573,7 +188861,7 @@ def index_netgear_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgear_get_serialize( + _param = self._index_netskope_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187604,7 +188892,7 @@ def index_netgear_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", '404': "str", '500': "str", } @@ -187620,7 +188908,7 @@ def index_netgear_get_with_http_info( @validate_call - def index_netgear_get_without_preload_content( + def index_netskope_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187658,9 +188946,9 @@ def index_netgear_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netgear\" + """Return vulnerability data stored in index \"netskope\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` :param page: set the page number of the response :type page: int @@ -187730,7 +189018,7 @@ def index_netgear_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgear_get_serialize( + _param = self._index_netskope_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187761,7 +189049,7 @@ def index_netgear_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", '404': "str", '500': "str", } @@ -187772,7 +189060,7 @@ def index_netgear_get_without_preload_content( return response_data.response - def _index_netgear_get_serialize( + def _index_netskope_get_serialize( self, page, limit, @@ -187932,7 +189220,7 @@ def _index_netgear_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/netgear', + resource_path='/index/netskope', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -187949,7 +189237,7 @@ def _index_netgear_get_serialize( @validate_call - def index_netskope_get( + def index_nexpose_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187986,10 +189274,10 @@ def index_netskope_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination: - """Return vulnerability data stored in index \"netskope\" + ) -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination: + """Return vulnerability data stored in index \"nexpose\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` :param page: set the page number of the response :type page: int @@ -188059,7 +189347,7 @@ def index_netskope_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netskope_get_serialize( + _param = self._index_nexpose_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188090,7 +189378,7 @@ def index_netskope_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", '404': "str", '500': "str", } @@ -188106,7 +189394,7 @@ def index_netskope_get( @validate_call - def index_netskope_get_with_http_info( + def index_nexpose_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188143,10 +189431,10 @@ def index_netskope_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination]: - """Return vulnerability data stored in index \"netskope\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination]: + """Return vulnerability data stored in index \"nexpose\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` :param page: set the page number of the response :type page: int @@ -188216,7 +189504,7 @@ def index_netskope_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netskope_get_serialize( + _param = self._index_nexpose_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188247,7 +189535,7 @@ def index_netskope_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", '404': "str", '500': "str", } @@ -188263,7 +189551,7 @@ def index_netskope_get_with_http_info( @validate_call - def index_netskope_get_without_preload_content( + def index_nexpose_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188301,9 +189589,9 @@ def index_netskope_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netskope\" + """Return vulnerability data stored in index \"nexpose\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` :param page: set the page number of the response :type page: int @@ -188373,7 +189661,7 @@ def index_netskope_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netskope_get_serialize( + _param = self._index_nexpose_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188404,7 +189692,7 @@ def index_netskope_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", '404': "str", '500': "str", } @@ -188415,7 +189703,7 @@ def index_netskope_get_without_preload_content( return response_data.response - def _index_netskope_get_serialize( + def _index_nexpose_get_serialize( self, page, limit, @@ -188575,7 +189863,7 @@ def _index_netskope_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/netskope', + resource_path='/index/nexpose', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -188592,7 +189880,7 @@ def _index_netskope_get_serialize( @validate_call - def index_nexpose_get( + def index_nginx_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188629,10 +189917,10 @@ def index_nexpose_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination: - """Return vulnerability data stored in index \"nexpose\" + ) -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"nginx\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` :param page: set the page number of the response :type page: int @@ -188702,7 +189990,7 @@ def index_nexpose_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nexpose_get_serialize( + _param = self._index_nginx_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188733,7 +190021,7 @@ def index_nexpose_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -188749,7 +190037,7 @@ def index_nexpose_get( @validate_call - def index_nexpose_get_with_http_info( + def index_nginx_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188786,10 +190074,10 @@ def index_nexpose_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination]: - """Return vulnerability data stored in index \"nexpose\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"nginx\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` :param page: set the page number of the response :type page: int @@ -188859,7 +190147,7 @@ def index_nexpose_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nexpose_get_serialize( + _param = self._index_nginx_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188890,7 +190178,7 @@ def index_nexpose_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -188906,7 +190194,7 @@ def index_nexpose_get_with_http_info( @validate_call - def index_nexpose_get_without_preload_content( + def index_nginx_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188944,9 +190232,9 @@ def index_nexpose_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nexpose\" + """Return vulnerability data stored in index \"nginx\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` :param page: set the page number of the response :type page: int @@ -189016,7 +190304,7 @@ def index_nexpose_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nexpose_get_serialize( + _param = self._index_nginx_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189047,7 +190335,7 @@ def index_nexpose_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -189058,7 +190346,7 @@ def index_nexpose_get_without_preload_content( return response_data.response - def _index_nexpose_get_serialize( + def _index_nginx_get_serialize( self, page, limit, @@ -189218,7 +190506,7 @@ def _index_nexpose_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nexpose', + resource_path='/index/nginx', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -189235,164 +190523,7 @@ def _index_nexpose_get_serialize( @validate_call - def index_nginx_get( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, - iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, - threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, - mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, - misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, - ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, - botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"nginx\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param alias: Specify a vulnerability alias to search with. - :type alias: str - :param iava: Specify an IAVA ID to search with. - :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str - :param threat_actor: Specify a threat actor name to search with. - :type threat_actor: str - :param mitre_id: Specify a MITRE ID to search with. - :type mitre_id: str - :param misp_id: Specify a MISP ID to search with. - :type misp_id: str - :param ransomware: Specify a ransomeware family name to search with. - :type ransomware: str - :param botnet: Specify a botnet name to search with. - :type botnet: str - :param published: Specify a published date - :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_nginx_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - cve=cve, - alias=alias, - iava=iava, - jvndb=jvndb, - ilvn=ilvn, - threat_actor=threat_actor, - mitre_id=mitre_id, - misp_id=misp_id, - ransomware=ransomware, - botnet=botnet, - published=published, - var_date=var_date, - var_date2=var_date2, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", - '404': "str", - '500': "str", - } - response_data = self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - response_data.read() - return self.api_client.response_deserialize( - response_data=response_data, - response_types_map=_response_types_map, - ).data - - - @validate_call - def index_nginx_get_with_http_info( + def index_nhs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189429,10 +190560,10 @@ def index_nginx_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"nginx\" + ) -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination: + """Return vulnerability data stored in index \"nhs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` :param page: set the page number of the response :type page: int @@ -189502,7 +190633,7 @@ def index_nginx_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nginx_get_serialize( + _param = self._index_nhs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189533,7 +190664,164 @@ def index_nginx_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_nhs_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination]: + """Return vulnerability data stored in index \"nhs\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_nhs_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", '404': "str", '500': "str", } @@ -189549,7 +190837,7 @@ def index_nginx_get_with_http_info( @validate_call - def index_nginx_get_without_preload_content( + def index_nhs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189587,9 +190875,9 @@ def index_nginx_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nginx\" + """Return vulnerability data stored in index \"nhs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` :param page: set the page number of the response :type page: int @@ -189659,7 +190947,7 @@ def index_nginx_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nginx_get_serialize( + _param = self._index_nhs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189690,7 +190978,7 @@ def index_nginx_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", '404': "str", '500': "str", } @@ -189701,7 +190989,7 @@ def index_nginx_get_without_preload_content( return response_data.response - def _index_nginx_get_serialize( + def _index_nhs_get_serialize( self, page, limit, @@ -189861,7 +191149,7 @@ def _index_nginx_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nginx', + resource_path='/index/nhs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -189878,7 +191166,7 @@ def _index_nginx_get_serialize( @validate_call - def index_nhs_get( + def index_ni_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189915,10 +191203,10 @@ def index_nhs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination: - """Return vulnerability data stored in index \"nhs\" + ) -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination: + """Return vulnerability data stored in index \"ni\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` :param page: set the page number of the response :type page: int @@ -189988,7 +191276,7 @@ def index_nhs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nhs_get_serialize( + _param = self._index_ni_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190019,7 +191307,7 @@ def index_nhs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", '404': "str", '500': "str", } @@ -190035,7 +191323,7 @@ def index_nhs_get( @validate_call - def index_nhs_get_with_http_info( + def index_ni_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190072,10 +191360,10 @@ def index_nhs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination]: - """Return vulnerability data stored in index \"nhs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination]: + """Return vulnerability data stored in index \"ni\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` :param page: set the page number of the response :type page: int @@ -190145,7 +191433,7 @@ def index_nhs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nhs_get_serialize( + _param = self._index_ni_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190176,7 +191464,7 @@ def index_nhs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", '404': "str", '500': "str", } @@ -190192,7 +191480,7 @@ def index_nhs_get_with_http_info( @validate_call - def index_nhs_get_without_preload_content( + def index_ni_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190230,9 +191518,9 @@ def index_nhs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nhs\" + """Return vulnerability data stored in index \"ni\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` :param page: set the page number of the response :type page: int @@ -190302,7 +191590,7 @@ def index_nhs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nhs_get_serialize( + _param = self._index_ni_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190333,7 +191621,7 @@ def index_nhs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", '404': "str", '500': "str", } @@ -190344,7 +191632,7 @@ def index_nhs_get_without_preload_content( return response_data.response - def _index_nhs_get_serialize( + def _index_ni_get_serialize( self, page, limit, @@ -190504,7 +191792,7 @@ def _index_nhs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nhs', + resource_path='/index/ni', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -190521,7 +191809,7 @@ def _index_nhs_get_serialize( @validate_call - def index_ni_get( + def index_nist_nvd2_cpematch_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190558,10 +191846,10 @@ def index_ni_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination: - """Return vulnerability data stored in index \"ni\" + ) -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination: + """Return vulnerability data stored in index \"nist-nvd2-cpematch\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` :param page: set the page number of the response :type page: int @@ -190631,7 +191919,7 @@ def index_ni_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ni_get_serialize( + _param = self._index_nist_nvd2_cpematch_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190662,7 +191950,7 @@ def index_ni_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", '404': "str", '500': "str", } @@ -190678,7 +191966,7 @@ def index_ni_get( @validate_call - def index_ni_get_with_http_info( + def index_nist_nvd2_cpematch_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190715,10 +192003,10 @@ def index_ni_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination]: - """Return vulnerability data stored in index \"ni\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd2-cpematch\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` :param page: set the page number of the response :type page: int @@ -190788,7 +192076,7 @@ def index_ni_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ni_get_serialize( + _param = self._index_nist_nvd2_cpematch_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190819,7 +192107,7 @@ def index_ni_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", '404': "str", '500': "str", } @@ -190835,7 +192123,7 @@ def index_ni_get_with_http_info( @validate_call - def index_ni_get_without_preload_content( + def index_nist_nvd2_cpematch_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190873,9 +192161,9 @@ def index_ni_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ni\" + """Return vulnerability data stored in index \"nist-nvd2-cpematch\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` :param page: set the page number of the response :type page: int @@ -190945,7 +192233,7 @@ def index_ni_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ni_get_serialize( + _param = self._index_nist_nvd2_cpematch_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190976,7 +192264,7 @@ def index_ni_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", '404': "str", '500': "str", } @@ -190987,7 +192275,7 @@ def index_ni_get_without_preload_content( return response_data.response - def _index_ni_get_serialize( + def _index_nist_nvd2_cpematch_get_serialize( self, page, limit, @@ -191147,7 +192435,7 @@ def _index_ni_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ni', + resource_path='/index/nist-nvd2-cpematch', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -191164,7 +192452,7 @@ def _index_ni_get_serialize( @validate_call - def index_nist_nvd2_cpematch_get( + def index_nist_nvd2_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191201,10 +192489,10 @@ def index_nist_nvd2_cpematch_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination: - """Return vulnerability data stored in index \"nist-nvd2-cpematch\" + ) -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination: + """Return vulnerability data stored in index \"nist-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -191274,7 +192562,7 @@ def index_nist_nvd2_cpematch_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_cpematch_get_serialize( + _param = self._index_nist_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191305,7 +192593,7 @@ def index_nist_nvd2_cpematch_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", '404': "str", '500': "str", } @@ -191321,7 +192609,7 @@ def index_nist_nvd2_cpematch_get( @validate_call - def index_nist_nvd2_cpematch_get_with_http_info( + def index_nist_nvd2_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191358,10 +192646,10 @@ def index_nist_nvd2_cpematch_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd2-cpematch\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -191431,7 +192719,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_cpematch_get_serialize( + _param = self._index_nist_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191462,7 +192750,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", '404': "str", '500': "str", } @@ -191478,7 +192766,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( @validate_call - def index_nist_nvd2_cpematch_get_without_preload_content( + def index_nist_nvd2_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191516,9 +192804,9 @@ def index_nist_nvd2_cpematch_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd2-cpematch\" + """Return vulnerability data stored in index \"nist-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -191588,7 +192876,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_cpematch_get_serialize( + _param = self._index_nist_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191619,7 +192907,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", '404': "str", '500': "str", } @@ -191630,7 +192918,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( return response_data.response - def _index_nist_nvd2_cpematch_get_serialize( + def _index_nist_nvd2_get_serialize( self, page, limit, @@ -191790,7 +193078,7 @@ def _index_nist_nvd2_cpematch_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nist-nvd2-cpematch', + resource_path='/index/nist-nvd2', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -191807,7 +193095,7 @@ def _index_nist_nvd2_cpematch_get_serialize( @validate_call - def index_nist_nvd2_get( + def index_nist_nvd2_sources_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191844,10 +193132,10 @@ def index_nist_nvd2_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination: - """Return vulnerability data stored in index \"nist-nvd2\" + ) -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination: + """Return vulnerability data stored in index \"nist-nvd2-sources\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` :param page: set the page number of the response :type page: int @@ -191917,7 +193205,7 @@ def index_nist_nvd2_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_get_serialize( + _param = self._index_nist_nvd2_sources_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191948,7 +193236,7 @@ def index_nist_nvd2_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", '404': "str", '500': "str", } @@ -191964,7 +193252,7 @@ def index_nist_nvd2_get( @validate_call - def index_nist_nvd2_get_with_http_info( + def index_nist_nvd2_sources_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192001,10 +193289,10 @@ def index_nist_nvd2_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd2\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd2-sources\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` :param page: set the page number of the response :type page: int @@ -192074,7 +193362,7 @@ def index_nist_nvd2_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_get_serialize( + _param = self._index_nist_nvd2_sources_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192105,7 +193393,7 @@ def index_nist_nvd2_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", '404': "str", '500': "str", } @@ -192121,7 +193409,7 @@ def index_nist_nvd2_get_with_http_info( @validate_call - def index_nist_nvd2_get_without_preload_content( + def index_nist_nvd2_sources_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192159,9 +193447,9 @@ def index_nist_nvd2_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd2\" + """Return vulnerability data stored in index \"nist-nvd2-sources\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` :param page: set the page number of the response :type page: int @@ -192231,7 +193519,7 @@ def index_nist_nvd2_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_get_serialize( + _param = self._index_nist_nvd2_sources_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192262,7 +193550,7 @@ def index_nist_nvd2_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", '404': "str", '500': "str", } @@ -192273,7 +193561,7 @@ def index_nist_nvd2_get_without_preload_content( return response_data.response - def _index_nist_nvd2_get_serialize( + def _index_nist_nvd2_sources_get_serialize( self, page, limit, @@ -192433,7 +193721,7 @@ def _index_nist_nvd2_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nist-nvd2', + resource_path='/index/nist-nvd2-sources', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -192450,7 +193738,7 @@ def _index_nist_nvd2_get_serialize( @validate_call - def index_nist_nvd2_sources_get( + def index_nist_nvd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192487,10 +193775,10 @@ def index_nist_nvd2_sources_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination: - """Return vulnerability data stored in index \"nist-nvd2-sources\" + ) -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination: + """Return vulnerability data stored in index \"nist-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -192560,7 +193848,7 @@ def index_nist_nvd2_sources_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_sources_get_serialize( + _param = self._index_nist_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192591,7 +193879,7 @@ def index_nist_nvd2_sources_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", '404': "str", '500': "str", } @@ -192607,7 +193895,7 @@ def index_nist_nvd2_sources_get( @validate_call - def index_nist_nvd2_sources_get_with_http_info( + def index_nist_nvd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192644,10 +193932,10 @@ def index_nist_nvd2_sources_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd2-sources\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsPaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -192717,7 +194005,7 @@ def index_nist_nvd2_sources_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_sources_get_serialize( + _param = self._index_nist_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192748,7 +194036,7 @@ def index_nist_nvd2_sources_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", '404': "str", '500': "str", } @@ -192764,7 +194052,7 @@ def index_nist_nvd2_sources_get_with_http_info( @validate_call - def index_nist_nvd2_sources_get_without_preload_content( + def index_nist_nvd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192802,9 +194090,9 @@ def index_nist_nvd2_sources_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd2-sources\" + """Return vulnerability data stored in index \"nist-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -192874,7 +194162,7 @@ def index_nist_nvd2_sources_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_sources_get_serialize( + _param = self._index_nist_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192905,7 +194193,7 @@ def index_nist_nvd2_sources_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", '404': "str", '500': "str", } @@ -192916,7 +194204,7 @@ def index_nist_nvd2_sources_get_without_preload_content( return response_data.response - def _index_nist_nvd2_sources_get_serialize( + def _index_nist_nvd_get_serialize( self, page, limit, @@ -193076,7 +194364,7 @@ def _index_nist_nvd2_sources_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nist-nvd2-sources', + resource_path='/index/nist-nvd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -193093,7 +194381,7 @@ def _index_nist_nvd2_sources_get_serialize( @validate_call - def index_nist_nvd_get( + def index_node_security_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193130,10 +194418,10 @@ def index_nist_nvd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination: - """Return vulnerability data stored in index \"nist-nvd\" + ) -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination: + """Return vulnerability data stored in index \"node-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` :param page: set the page number of the response :type page: int @@ -193203,7 +194491,7 @@ def index_nist_nvd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd_get_serialize( + _param = self._index_node_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193234,7 +194522,7 @@ def index_nist_nvd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", '404': "str", '500': "str", } @@ -193250,7 +194538,7 @@ def index_nist_nvd_get( @validate_call - def index_nist_nvd_get_with_http_info( + def index_node_security_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193287,10 +194575,10 @@ def index_nist_nvd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsPaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination]: + """Return vulnerability data stored in index \"node-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` :param page: set the page number of the response :type page: int @@ -193360,7 +194648,7 @@ def index_nist_nvd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd_get_serialize( + _param = self._index_node_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193391,7 +194679,7 @@ def index_nist_nvd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", '404': "str", '500': "str", } @@ -193407,7 +194695,7 @@ def index_nist_nvd_get_with_http_info( @validate_call - def index_nist_nvd_get_without_preload_content( + def index_node_security_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193445,9 +194733,9 @@ def index_nist_nvd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd\" + """Return vulnerability data stored in index \"node-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` :param page: set the page number of the response :type page: int @@ -193517,7 +194805,7 @@ def index_nist_nvd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd_get_serialize( + _param = self._index_node_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193548,7 +194836,7 @@ def index_nist_nvd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", '404': "str", '500': "str", } @@ -193559,7 +194847,7 @@ def index_nist_nvd_get_without_preload_content( return response_data.response - def _index_nist_nvd_get_serialize( + def _index_node_security_get_serialize( self, page, limit, @@ -193719,7 +195007,7 @@ def _index_nist_nvd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nist-nvd', + resource_path='/index/node-security', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -193736,7 +195024,7 @@ def _index_nist_nvd_get_serialize( @validate_call - def index_node_security_get( + def index_nodejs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193773,10 +195061,10 @@ def index_node_security_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination: - """Return vulnerability data stored in index \"node-security\" + ) -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination: + """Return vulnerability data stored in index \"nodejs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` :param page: set the page number of the response :type page: int @@ -193846,7 +195134,7 @@ def index_node_security_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_node_security_get_serialize( + _param = self._index_nodejs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193877,7 +195165,7 @@ def index_node_security_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", '404': "str", '500': "str", } @@ -193893,7 +195181,7 @@ def index_node_security_get( @validate_call - def index_node_security_get_with_http_info( + def index_nodejs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193930,10 +195218,10 @@ def index_node_security_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination]: - """Return vulnerability data stored in index \"node-security\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination]: + """Return vulnerability data stored in index \"nodejs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` :param page: set the page number of the response :type page: int @@ -194003,7 +195291,7 @@ def index_node_security_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_node_security_get_serialize( + _param = self._index_nodejs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194034,7 +195322,7 @@ def index_node_security_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", '404': "str", '500': "str", } @@ -194050,7 +195338,7 @@ def index_node_security_get_with_http_info( @validate_call - def index_node_security_get_without_preload_content( + def index_nodejs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194088,9 +195376,9 @@ def index_node_security_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"node-security\" + """Return vulnerability data stored in index \"nodejs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` :param page: set the page number of the response :type page: int @@ -194160,7 +195448,7 @@ def index_node_security_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_node_security_get_serialize( + _param = self._index_nodejs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194191,7 +195479,7 @@ def index_node_security_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", '404': "str", '500': "str", } @@ -194202,7 +195490,7 @@ def index_node_security_get_without_preload_content( return response_data.response - def _index_node_security_get_serialize( + def _index_nodejs_get_serialize( self, page, limit, @@ -194362,7 +195650,7 @@ def _index_node_security_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/node-security', + resource_path='/index/nodejs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -194379,7 +195667,7 @@ def _index_node_security_get_serialize( @validate_call - def index_nodejs_get( + def index_nokia_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194416,10 +195704,10 @@ def index_nodejs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination: - """Return vulnerability data stored in index \"nodejs\" + ) -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination: + """Return vulnerability data stored in index \"nokia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` :param page: set the page number of the response :type page: int @@ -194489,7 +195777,7 @@ def index_nodejs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nodejs_get_serialize( + _param = self._index_nokia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194520,7 +195808,7 @@ def index_nodejs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", '404': "str", '500': "str", } @@ -194536,7 +195824,7 @@ def index_nodejs_get( @validate_call - def index_nodejs_get_with_http_info( + def index_nokia_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194573,10 +195861,10 @@ def index_nodejs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination]: - """Return vulnerability data stored in index \"nodejs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination]: + """Return vulnerability data stored in index \"nokia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` :param page: set the page number of the response :type page: int @@ -194646,7 +195934,7 @@ def index_nodejs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nodejs_get_serialize( + _param = self._index_nokia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194677,7 +195965,7 @@ def index_nodejs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", '404': "str", '500': "str", } @@ -194693,7 +195981,7 @@ def index_nodejs_get_with_http_info( @validate_call - def index_nodejs_get_without_preload_content( + def index_nokia_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194731,9 +196019,9 @@ def index_nodejs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nodejs\" + """Return vulnerability data stored in index \"nokia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` :param page: set the page number of the response :type page: int @@ -194803,7 +196091,7 @@ def index_nodejs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nodejs_get_serialize( + _param = self._index_nokia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194834,7 +196122,7 @@ def index_nodejs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", '404': "str", '500': "str", } @@ -194845,7 +196133,7 @@ def index_nodejs_get_without_preload_content( return response_data.response - def _index_nodejs_get_serialize( + def _index_nokia_get_serialize( self, page, limit, @@ -195005,7 +196293,7 @@ def _index_nodejs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nodejs', + resource_path='/index/nokia', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -195022,7 +196310,7 @@ def _index_nodejs_get_serialize( @validate_call - def index_nokia_get( + def index_notepadplusplus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195059,10 +196347,10 @@ def index_nokia_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination: - """Return vulnerability data stored in index \"nokia\" + ) -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination: + """Return vulnerability data stored in index \"notepadplusplus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` :param page: set the page number of the response :type page: int @@ -195132,7 +196420,7 @@ def index_nokia_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nokia_get_serialize( + _param = self._index_notepadplusplus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195163,7 +196451,7 @@ def index_nokia_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", '404': "str", '500': "str", } @@ -195179,7 +196467,7 @@ def index_nokia_get( @validate_call - def index_nokia_get_with_http_info( + def index_notepadplusplus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195216,10 +196504,10 @@ def index_nokia_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination]: - """Return vulnerability data stored in index \"nokia\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination]: + """Return vulnerability data stored in index \"notepadplusplus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` :param page: set the page number of the response :type page: int @@ -195289,7 +196577,7 @@ def index_nokia_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nokia_get_serialize( + _param = self._index_notepadplusplus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195320,7 +196608,7 @@ def index_nokia_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", '404': "str", '500': "str", } @@ -195336,7 +196624,7 @@ def index_nokia_get_with_http_info( @validate_call - def index_nokia_get_without_preload_content( + def index_notepadplusplus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195374,9 +196662,9 @@ def index_nokia_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nokia\" + """Return vulnerability data stored in index \"notepadplusplus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` :param page: set the page number of the response :type page: int @@ -195446,7 +196734,7 @@ def index_nokia_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nokia_get_serialize( + _param = self._index_notepadplusplus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195477,7 +196765,7 @@ def index_nokia_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", '404': "str", '500': "str", } @@ -195488,7 +196776,7 @@ def index_nokia_get_without_preload_content( return response_data.response - def _index_nokia_get_serialize( + def _index_notepadplusplus_get_serialize( self, page, limit, @@ -195648,7 +196936,7 @@ def _index_nokia_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nokia', + resource_path='/index/notepadplusplus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -195665,7 +196953,7 @@ def _index_nokia_get_serialize( @validate_call - def index_notepadplusplus_get( + def index_nozomi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195702,10 +196990,10 @@ def index_notepadplusplus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination: - """Return vulnerability data stored in index \"notepadplusplus\" + ) -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination: + """Return vulnerability data stored in index \"nozomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` :param page: set the page number of the response :type page: int @@ -195775,7 +197063,7 @@ def index_notepadplusplus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_notepadplusplus_get_serialize( + _param = self._index_nozomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195806,7 +197094,7 @@ def index_notepadplusplus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", '404': "str", '500': "str", } @@ -195822,7 +197110,7 @@ def index_notepadplusplus_get( @validate_call - def index_notepadplusplus_get_with_http_info( + def index_nozomi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195859,10 +197147,10 @@ def index_notepadplusplus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination]: - """Return vulnerability data stored in index \"notepadplusplus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination]: + """Return vulnerability data stored in index \"nozomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` :param page: set the page number of the response :type page: int @@ -195932,7 +197220,7 @@ def index_notepadplusplus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_notepadplusplus_get_serialize( + _param = self._index_nozomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195963,7 +197251,7 @@ def index_notepadplusplus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", '404': "str", '500': "str", } @@ -195979,7 +197267,7 @@ def index_notepadplusplus_get_with_http_info( @validate_call - def index_notepadplusplus_get_without_preload_content( + def index_nozomi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196017,9 +197305,9 @@ def index_notepadplusplus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"notepadplusplus\" + """Return vulnerability data stored in index \"nozomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` :param page: set the page number of the response :type page: int @@ -196089,7 +197377,7 @@ def index_notepadplusplus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_notepadplusplus_get_serialize( + _param = self._index_nozomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196120,7 +197408,7 @@ def index_notepadplusplus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", '404': "str", '500': "str", } @@ -196131,7 +197419,7 @@ def index_notepadplusplus_get_without_preload_content( return response_data.response - def _index_notepadplusplus_get_serialize( + def _index_nozomi_get_serialize( self, page, limit, @@ -196291,7 +197579,7 @@ def _index_notepadplusplus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/notepadplusplus', + resource_path='/index/nozomi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -196308,7 +197596,7 @@ def _index_notepadplusplus_get_serialize( @validate_call - def index_nozomi_get( + def index_npm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196345,10 +197633,10 @@ def index_nozomi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination: - """Return vulnerability data stored in index \"nozomi\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"npm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` :param page: set the page number of the response :type page: int @@ -196418,7 +197706,7 @@ def index_nozomi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nozomi_get_serialize( + _param = self._index_npm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196449,7 +197737,7 @@ def index_nozomi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -196465,7 +197753,7 @@ def index_nozomi_get( @validate_call - def index_nozomi_get_with_http_info( + def index_npm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196502,10 +197790,10 @@ def index_nozomi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination]: - """Return vulnerability data stored in index \"nozomi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"npm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` :param page: set the page number of the response :type page: int @@ -196575,7 +197863,7 @@ def index_nozomi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nozomi_get_serialize( + _param = self._index_npm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196606,7 +197894,7 @@ def index_nozomi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -196622,7 +197910,7 @@ def index_nozomi_get_with_http_info( @validate_call - def index_nozomi_get_without_preload_content( + def index_npm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196660,9 +197948,9 @@ def index_nozomi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nozomi\" + """Return vulnerability data stored in index \"npm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` :param page: set the page number of the response :type page: int @@ -196732,7 +198020,7 @@ def index_nozomi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nozomi_get_serialize( + _param = self._index_npm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196763,7 +198051,7 @@ def index_nozomi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -196774,7 +198062,7 @@ def index_nozomi_get_without_preload_content( return response_data.response - def _index_nozomi_get_serialize( + def _index_npm_get_serialize( self, page, limit, @@ -196934,7 +198222,7 @@ def _index_nozomi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nozomi', + resource_path='/index/npm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -196951,7 +198239,7 @@ def _index_nozomi_get_serialize( @validate_call - def index_npm_get( + def index_ntp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196988,10 +198276,10 @@ def index_npm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"npm\" + ) -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination: + """Return vulnerability data stored in index \"ntp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` :param page: set the page number of the response :type page: int @@ -197061,7 +198349,7 @@ def index_npm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_npm_get_serialize( + _param = self._index_ntp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197092,7 +198380,7 @@ def index_npm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", '404': "str", '500': "str", } @@ -197108,7 +198396,7 @@ def index_npm_get( @validate_call - def index_npm_get_with_http_info( + def index_ntp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197145,10 +198433,10 @@ def index_npm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"npm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination]: + """Return vulnerability data stored in index \"ntp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` :param page: set the page number of the response :type page: int @@ -197218,7 +198506,7 @@ def index_npm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_npm_get_serialize( + _param = self._index_ntp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197249,7 +198537,7 @@ def index_npm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", '404': "str", '500': "str", } @@ -197265,7 +198553,7 @@ def index_npm_get_with_http_info( @validate_call - def index_npm_get_without_preload_content( + def index_ntp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197303,9 +198591,9 @@ def index_npm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"npm\" + """Return vulnerability data stored in index \"ntp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` :param page: set the page number of the response :type page: int @@ -197375,7 +198663,7 @@ def index_npm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_npm_get_serialize( + _param = self._index_ntp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197406,7 +198694,7 @@ def index_npm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", '404': "str", '500': "str", } @@ -197417,7 +198705,7 @@ def index_npm_get_without_preload_content( return response_data.response - def _index_npm_get_serialize( + def _index_ntp_get_serialize( self, page, limit, @@ -197577,7 +198865,7 @@ def _index_npm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/npm', + resource_path='/index/ntp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -197594,7 +198882,7 @@ def _index_npm_get_serialize( @validate_call - def index_ntp_get( + def index_nuclei_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197631,10 +198919,10 @@ def index_ntp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination: - """Return vulnerability data stored in index \"ntp\" + ) -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination: + """Return vulnerability data stored in index \"nuclei\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` :param page: set the page number of the response :type page: int @@ -197704,7 +198992,7 @@ def index_ntp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ntp_get_serialize( + _param = self._index_nuclei_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197735,7 +199023,7 @@ def index_ntp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", '404': "str", '500': "str", } @@ -197751,7 +199039,7 @@ def index_ntp_get( @validate_call - def index_ntp_get_with_http_info( + def index_nuclei_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197788,10 +199076,10 @@ def index_ntp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination]: - """Return vulnerability data stored in index \"ntp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination]: + """Return vulnerability data stored in index \"nuclei\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` :param page: set the page number of the response :type page: int @@ -197861,7 +199149,7 @@ def index_ntp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ntp_get_serialize( + _param = self._index_nuclei_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197892,7 +199180,7 @@ def index_ntp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", '404': "str", '500': "str", } @@ -197908,7 +199196,7 @@ def index_ntp_get_with_http_info( @validate_call - def index_ntp_get_without_preload_content( + def index_nuclei_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197946,9 +199234,9 @@ def index_ntp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ntp\" + """Return vulnerability data stored in index \"nuclei\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` :param page: set the page number of the response :type page: int @@ -198018,7 +199306,7 @@ def index_ntp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ntp_get_serialize( + _param = self._index_nuclei_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198049,7 +199337,7 @@ def index_ntp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", '404': "str", '500': "str", } @@ -198060,7 +199348,7 @@ def index_ntp_get_without_preload_content( return response_data.response - def _index_ntp_get_serialize( + def _index_nuclei_get_serialize( self, page, limit, @@ -198220,7 +199508,7 @@ def _index_ntp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ntp', + resource_path='/index/nuclei', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -198237,7 +199525,7 @@ def _index_ntp_get_serialize( @validate_call - def index_nuclei_get( + def index_nuget_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198274,10 +199562,10 @@ def index_nuclei_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination: - """Return vulnerability data stored in index \"nuclei\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"nuget\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` :param page: set the page number of the response :type page: int @@ -198347,7 +199635,7 @@ def index_nuclei_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuclei_get_serialize( + _param = self._index_nuget_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198378,7 +199666,7 @@ def index_nuclei_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -198394,7 +199682,7 @@ def index_nuclei_get( @validate_call - def index_nuclei_get_with_http_info( + def index_nuget_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198431,10 +199719,10 @@ def index_nuclei_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination]: - """Return vulnerability data stored in index \"nuclei\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"nuget\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` :param page: set the page number of the response :type page: int @@ -198504,7 +199792,7 @@ def index_nuclei_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuclei_get_serialize( + _param = self._index_nuget_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198535,7 +199823,7 @@ def index_nuclei_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -198551,7 +199839,7 @@ def index_nuclei_get_with_http_info( @validate_call - def index_nuclei_get_without_preload_content( + def index_nuget_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198589,9 +199877,9 @@ def index_nuclei_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nuclei\" + """Return vulnerability data stored in index \"nuget\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` :param page: set the page number of the response :type page: int @@ -198661,7 +199949,7 @@ def index_nuclei_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuclei_get_serialize( + _param = self._index_nuget_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198692,7 +199980,7 @@ def index_nuclei_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -198703,7 +199991,7 @@ def index_nuclei_get_without_preload_content( return response_data.response - def _index_nuclei_get_serialize( + def _index_nuget_get_serialize( self, page, limit, @@ -198863,7 +200151,7 @@ def _index_nuclei_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nuclei', + resource_path='/index/nuget', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -198880,7 +200168,7 @@ def _index_nuclei_get_serialize( @validate_call - def index_nuget_get( + def index_nvd_cpe_dictionary_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198917,10 +200205,10 @@ def index_nuget_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"nuget\" + ) -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination: + """Return vulnerability data stored in index \"nvd-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -198990,7 +200278,7 @@ def index_nuget_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuget_get_serialize( + _param = self._index_nvd_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199021,7 +200309,7 @@ def index_nuget_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -199037,7 +200325,7 @@ def index_nuget_get( @validate_call - def index_nuget_get_with_http_info( + def index_nvd_cpe_dictionary_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199074,10 +200362,10 @@ def index_nuget_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"nuget\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination]: + """Return vulnerability data stored in index \"nvd-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -199147,7 +200435,7 @@ def index_nuget_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuget_get_serialize( + _param = self._index_nvd_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199178,7 +200466,7 @@ def index_nuget_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -199194,7 +200482,7 @@ def index_nuget_get_with_http_info( @validate_call - def index_nuget_get_without_preload_content( + def index_nvd_cpe_dictionary_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199232,9 +200520,9 @@ def index_nuget_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nuget\" + """Return vulnerability data stored in index \"nvd-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -199304,7 +200592,7 @@ def index_nuget_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuget_get_serialize( + _param = self._index_nvd_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199335,7 +200623,7 @@ def index_nuget_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -199346,7 +200634,7 @@ def index_nuget_get_without_preload_content( return response_data.response - def _index_nuget_get_serialize( + def _index_nvd_cpe_dictionary_get_serialize( self, page, limit, @@ -199506,7 +200794,7 @@ def _index_nuget_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nuget', + resource_path='/index/nvd-cpe-dictionary', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -199523,7 +200811,7 @@ def _index_nuget_get_serialize( @validate_call - def index_nvd_cpe_dictionary_get( + def index_nvidia_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199560,10 +200848,10 @@ def index_nvd_cpe_dictionary_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination: - """Return vulnerability data stored in index \"nvd-cpe-dictionary\" + ) -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination: + """Return vulnerability data stored in index \"nvidia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` :param page: set the page number of the response :type page: int @@ -199633,7 +200921,7 @@ def index_nvd_cpe_dictionary_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvd_cpe_dictionary_get_serialize( + _param = self._index_nvidia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199664,7 +200952,7 @@ def index_nvd_cpe_dictionary_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", '404': "str", '500': "str", } @@ -199680,7 +200968,7 @@ def index_nvd_cpe_dictionary_get( @validate_call - def index_nvd_cpe_dictionary_get_with_http_info( + def index_nvidia_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199717,10 +201005,10 @@ def index_nvd_cpe_dictionary_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination]: - """Return vulnerability data stored in index \"nvd-cpe-dictionary\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination]: + """Return vulnerability data stored in index \"nvidia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` :param page: set the page number of the response :type page: int @@ -199790,7 +201078,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvd_cpe_dictionary_get_serialize( + _param = self._index_nvidia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199821,7 +201109,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", '404': "str", '500': "str", } @@ -199837,7 +201125,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( @validate_call - def index_nvd_cpe_dictionary_get_without_preload_content( + def index_nvidia_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199875,9 +201163,9 @@ def index_nvd_cpe_dictionary_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nvd-cpe-dictionary\" + """Return vulnerability data stored in index \"nvidia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` :param page: set the page number of the response :type page: int @@ -199947,7 +201235,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvd_cpe_dictionary_get_serialize( + _param = self._index_nvidia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199978,7 +201266,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", '404': "str", '500': "str", } @@ -199989,7 +201277,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( return response_data.response - def _index_nvd_cpe_dictionary_get_serialize( + def _index_nvidia_get_serialize( self, page, limit, @@ -200149,7 +201437,7 @@ def _index_nvd_cpe_dictionary_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nvd-cpe-dictionary', + resource_path='/index/nvidia', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -200166,7 +201454,7 @@ def _index_nvd_cpe_dictionary_get_serialize( @validate_call - def index_nvidia_get( + def index_nz_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200203,10 +201491,10 @@ def index_nvidia_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination: - """Return vulnerability data stored in index \"nvidia\" + ) -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"nz-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -200276,7 +201564,7 @@ def index_nvidia_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvidia_get_serialize( + _param = self._index_nz_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200307,7 +201595,7 @@ def index_nvidia_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -200323,7 +201611,7 @@ def index_nvidia_get( @validate_call - def index_nvidia_get_with_http_info( + def index_nz_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200360,10 +201648,10 @@ def index_nvidia_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination]: - """Return vulnerability data stored in index \"nvidia\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"nz-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -200433,7 +201721,7 @@ def index_nvidia_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvidia_get_serialize( + _param = self._index_nz_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200464,7 +201752,7 @@ def index_nvidia_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -200480,7 +201768,7 @@ def index_nvidia_get_with_http_info( @validate_call - def index_nvidia_get_without_preload_content( + def index_nz_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200518,9 +201806,9 @@ def index_nvidia_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nvidia\" + """Return vulnerability data stored in index \"nz-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -200590,7 +201878,7 @@ def index_nvidia_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvidia_get_serialize( + _param = self._index_nz_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200621,7 +201909,7 @@ def index_nvidia_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -200632,7 +201920,7 @@ def index_nvidia_get_without_preload_content( return response_data.response - def _index_nvidia_get_serialize( + def _index_nz_advisories_get_serialize( self, page, limit, @@ -200792,7 +202080,7 @@ def _index_nvidia_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nvidia', + resource_path='/index/nz-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -200809,7 +202097,7 @@ def _index_nvidia_get_serialize( @validate_call - def index_nz_advisories_get( + def index_octopus_deploy_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200846,10 +202134,10 @@ def index_nz_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"nz-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination: + """Return vulnerability data stored in index \"octopus-deploy\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` :param page: set the page number of the response :type page: int @@ -200919,7 +202207,7 @@ def index_nz_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nz_advisories_get_serialize( + _param = self._index_octopus_deploy_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200950,7 +202238,7 @@ def index_nz_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", '404': "str", '500': "str", } @@ -200966,7 +202254,7 @@ def index_nz_advisories_get( @validate_call - def index_nz_advisories_get_with_http_info( + def index_octopus_deploy_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201003,10 +202291,10 @@ def index_nz_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"nz-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination]: + """Return vulnerability data stored in index \"octopus-deploy\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` :param page: set the page number of the response :type page: int @@ -201076,7 +202364,7 @@ def index_nz_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nz_advisories_get_serialize( + _param = self._index_octopus_deploy_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201107,7 +202395,7 @@ def index_nz_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", '404': "str", '500': "str", } @@ -201123,7 +202411,7 @@ def index_nz_advisories_get_with_http_info( @validate_call - def index_nz_advisories_get_without_preload_content( + def index_octopus_deploy_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201161,9 +202449,9 @@ def index_nz_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nz-advisories\" + """Return vulnerability data stored in index \"octopus-deploy\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` :param page: set the page number of the response :type page: int @@ -201233,7 +202521,7 @@ def index_nz_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nz_advisories_get_serialize( + _param = self._index_octopus_deploy_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201264,7 +202552,7 @@ def index_nz_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", '404': "str", '500': "str", } @@ -201275,7 +202563,7 @@ def index_nz_advisories_get_without_preload_content( return response_data.response - def _index_nz_advisories_get_serialize( + def _index_octopus_deploy_get_serialize( self, page, limit, @@ -201435,7 +202723,7 @@ def _index_nz_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/nz-advisories', + resource_path='/index/octopus-deploy', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -201452,7 +202740,7 @@ def _index_nz_advisories_get_serialize( @validate_call - def index_octopus_deploy_get( + def index_okta_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201489,10 +202777,10 @@ def index_octopus_deploy_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination: - """Return vulnerability data stored in index \"octopus-deploy\" + ) -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination: + """Return vulnerability data stored in index \"okta\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` :param page: set the page number of the response :type page: int @@ -201562,7 +202850,7 @@ def index_octopus_deploy_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_octopus_deploy_get_serialize( + _param = self._index_okta_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201593,7 +202881,7 @@ def index_octopus_deploy_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", '404': "str", '500': "str", } @@ -201609,7 +202897,7 @@ def index_octopus_deploy_get( @validate_call - def index_octopus_deploy_get_with_http_info( + def index_okta_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201646,10 +202934,10 @@ def index_octopus_deploy_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination]: - """Return vulnerability data stored in index \"octopus-deploy\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination]: + """Return vulnerability data stored in index \"okta\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` :param page: set the page number of the response :type page: int @@ -201719,7 +203007,7 @@ def index_octopus_deploy_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_octopus_deploy_get_serialize( + _param = self._index_okta_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201750,7 +203038,7 @@ def index_octopus_deploy_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", '404': "str", '500': "str", } @@ -201766,7 +203054,7 @@ def index_octopus_deploy_get_with_http_info( @validate_call - def index_octopus_deploy_get_without_preload_content( + def index_okta_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201804,9 +203092,9 @@ def index_octopus_deploy_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"octopus-deploy\" + """Return vulnerability data stored in index \"okta\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` :param page: set the page number of the response :type page: int @@ -201876,7 +203164,7 @@ def index_octopus_deploy_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_octopus_deploy_get_serialize( + _param = self._index_okta_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201907,7 +203195,7 @@ def index_octopus_deploy_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", '404': "str", '500': "str", } @@ -201918,7 +203206,7 @@ def index_octopus_deploy_get_without_preload_content( return response_data.response - def _index_octopus_deploy_get_serialize( + def _index_okta_get_serialize( self, page, limit, @@ -202078,7 +203366,7 @@ def _index_octopus_deploy_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/octopus-deploy', + resource_path='/index/okta', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -202095,7 +203383,7 @@ def _index_octopus_deploy_get_serialize( @validate_call - def index_okta_get( + def index_omron_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202132,10 +203420,10 @@ def index_okta_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination: - """Return vulnerability data stored in index \"okta\" + ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -202205,7 +203493,7 @@ def index_okta_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_okta_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202236,7 +203524,7 @@ def index_okta_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -202252,7 +203540,7 @@ def index_okta_get( @validate_call - def index_okta_get_with_http_info( + def index_omron_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202289,10 +203577,10 @@ def index_okta_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination]: - """Return vulnerability data stored in index \"okta\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -202362,7 +203650,7 @@ def index_okta_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_okta_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202393,7 +203681,7 @@ def index_okta_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -202409,7 +203697,7 @@ def index_okta_get_with_http_info( @validate_call - def index_okta_get_without_preload_content( + def index_omron_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202447,9 +203735,9 @@ def index_okta_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"okta\" + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -202519,7 +203807,7 @@ def index_okta_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_okta_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202550,7 +203838,7 @@ def index_okta_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -202561,7 +203849,7 @@ def index_okta_get_without_preload_content( return response_data.response - def _index_okta_get_serialize( + def _index_omron_get_serialize( self, page, limit, @@ -202721,7 +204009,7 @@ def _index_okta_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/okta', + resource_path='/index/omron', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -202738,7 +204026,7 @@ def _index_okta_get_serialize( @validate_call - def index_omron_get( + def index_one_e_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202775,10 +204063,10 @@ def index_omron_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: - """Return vulnerability data stored in index \"omron\" + ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -202848,7 +204136,7 @@ def index_omron_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202879,7 +204167,7 @@ def index_omron_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -202895,7 +204183,7 @@ def index_omron_get( @validate_call - def index_omron_get_with_http_info( + def index_one_e_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202932,10 +204220,10 @@ def index_omron_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: - """Return vulnerability data stored in index \"omron\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -203005,7 +204293,7 @@ def index_omron_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203036,7 +204324,7 @@ def index_omron_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -203052,7 +204340,7 @@ def index_omron_get_with_http_info( @validate_call - def index_omron_get_without_preload_content( + def index_one_e_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203090,9 +204378,9 @@ def index_omron_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"omron\" + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -203162,7 +204450,7 @@ def index_omron_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203193,7 +204481,7 @@ def index_omron_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -203204,7 +204492,7 @@ def index_omron_get_without_preload_content( return response_data.response - def _index_omron_get_serialize( + def _index_one_e_get_serialize( self, page, limit, @@ -203364,7 +204652,7 @@ def _index_omron_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/omron', + resource_path='/index/one-e', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -203381,7 +204669,7 @@ def _index_omron_get_serialize( @validate_call - def index_one_e_get( + def index_opam_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203418,10 +204706,10 @@ def index_one_e_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: - """Return vulnerability data stored in index \"one-e\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -203491,7 +204779,7 @@ def index_one_e_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203522,7 +204810,7 @@ def index_one_e_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -203538,7 +204826,7 @@ def index_one_e_get( @validate_call - def index_one_e_get_with_http_info( + def index_opam_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203575,10 +204863,10 @@ def index_one_e_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: - """Return vulnerability data stored in index \"one-e\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -203648,7 +204936,7 @@ def index_one_e_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203679,7 +204967,7 @@ def index_one_e_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -203695,7 +204983,7 @@ def index_one_e_get_with_http_info( @validate_call - def index_one_e_get_without_preload_content( + def index_opam_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203733,9 +205021,9 @@ def index_one_e_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"one-e\" + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -203805,7 +205093,7 @@ def index_one_e_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203836,7 +205124,7 @@ def index_one_e_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -203847,7 +205135,7 @@ def index_one_e_get_without_preload_content( return response_data.response - def _index_one_e_get_serialize( + def _index_opam_get_serialize( self, page, limit, @@ -204007,7 +205295,7 @@ def _index_one_e_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/one-e', + resource_path='/index/opam', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -204024,7 +205312,7 @@ def _index_one_e_get_serialize( @validate_call - def index_opam_get( + def index_open_cvdb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204061,10 +205349,10 @@ def index_opam_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"opam\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -204134,7 +205422,7 @@ def index_opam_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204165,7 +205453,7 @@ def index_opam_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -204181,7 +205469,7 @@ def index_opam_get( @validate_call - def index_opam_get_with_http_info( + def index_open_cvdb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204218,10 +205506,10 @@ def index_opam_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"opam\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -204291,7 +205579,7 @@ def index_opam_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204322,7 +205610,7 @@ def index_opam_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -204338,7 +205626,7 @@ def index_opam_get_with_http_info( @validate_call - def index_opam_get_without_preload_content( + def index_open_cvdb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204376,9 +205664,9 @@ def index_opam_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opam\" + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -204448,7 +205736,7 @@ def index_opam_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204479,7 +205767,7 @@ def index_opam_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -204490,7 +205778,7 @@ def index_opam_get_without_preload_content( return response_data.response - def _index_opam_get_serialize( + def _index_open_cvdb_get_serialize( self, page, limit, @@ -204650,7 +205938,7 @@ def _index_opam_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/opam', + resource_path='/index/open-cvdb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -204667,7 +205955,7 @@ def _index_opam_get_serialize( @validate_call - def index_open_cvdb_get( + def index_openbsd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204704,10 +205992,10 @@ def index_open_cvdb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -204777,7 +206065,7 @@ def index_open_cvdb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204808,7 +206096,7 @@ def index_open_cvdb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -204824,7 +206112,7 @@ def index_open_cvdb_get( @validate_call - def index_open_cvdb_get_with_http_info( + def index_openbsd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204861,10 +206149,10 @@ def index_open_cvdb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -204934,7 +206222,7 @@ def index_open_cvdb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204965,7 +206253,7 @@ def index_open_cvdb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -204981,7 +206269,7 @@ def index_open_cvdb_get_with_http_info( @validate_call - def index_open_cvdb_get_without_preload_content( + def index_openbsd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205019,9 +206307,9 @@ def index_open_cvdb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"open-cvdb\" + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -205091,7 +206379,7 @@ def index_open_cvdb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205122,7 +206410,7 @@ def index_open_cvdb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -205133,7 +206421,7 @@ def index_open_cvdb_get_without_preload_content( return response_data.response - def _index_open_cvdb_get_serialize( + def _index_openbsd_get_serialize( self, page, limit, @@ -205293,7 +206581,7 @@ def _index_open_cvdb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/open-cvdb', + resource_path='/index/openbsd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -205310,7 +206598,7 @@ def _index_open_cvdb_get_serialize( @validate_call - def index_openbsd_get( + def index_opengear_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205347,10 +206635,10 @@ def index_openbsd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: - """Return vulnerability data stored in index \"openbsd\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -205420,7 +206708,7 @@ def index_openbsd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205451,7 +206739,7 @@ def index_openbsd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -205467,7 +206755,7 @@ def index_openbsd_get( @validate_call - def index_openbsd_get_with_http_info( + def index_opengear_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205504,10 +206792,10 @@ def index_openbsd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: - """Return vulnerability data stored in index \"openbsd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -205577,7 +206865,7 @@ def index_openbsd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205608,7 +206896,7 @@ def index_openbsd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -205624,7 +206912,7 @@ def index_openbsd_get_with_http_info( @validate_call - def index_openbsd_get_without_preload_content( + def index_opengear_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205662,9 +206950,9 @@ def index_openbsd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openbsd\" + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -205734,7 +207022,7 @@ def index_openbsd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205765,7 +207053,7 @@ def index_openbsd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -205776,7 +207064,7 @@ def index_openbsd_get_without_preload_content( return response_data.response - def _index_openbsd_get_serialize( + def _index_opengear_get_serialize( self, page, limit, @@ -205936,7 +207224,7 @@ def _index_openbsd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/openbsd', + resource_path='/index/opengear', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -205953,7 +207241,7 @@ def _index_openbsd_get_serialize( @validate_call - def index_opengear_get( + def index_openjdk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205990,10 +207278,10 @@ def index_opengear_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: - """Return vulnerability data stored in index \"opengear\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -206063,7 +207351,7 @@ def index_opengear_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206094,7 +207382,7 @@ def index_opengear_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -206110,7 +207398,7 @@ def index_opengear_get( @validate_call - def index_opengear_get_with_http_info( + def index_openjdk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206147,10 +207435,10 @@ def index_opengear_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: - """Return vulnerability data stored in index \"opengear\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -206220,7 +207508,7 @@ def index_opengear_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206251,7 +207539,7 @@ def index_opengear_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -206267,7 +207555,7 @@ def index_opengear_get_with_http_info( @validate_call - def index_opengear_get_without_preload_content( + def index_openjdk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206305,9 +207593,9 @@ def index_opengear_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opengear\" + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -206377,7 +207665,7 @@ def index_opengear_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206408,7 +207696,7 @@ def index_opengear_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -206419,7 +207707,7 @@ def index_opengear_get_without_preload_content( return response_data.response - def _index_opengear_get_serialize( + def _index_openjdk_get_serialize( self, page, limit, @@ -206579,7 +207867,7 @@ def _index_opengear_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/opengear', + resource_path='/index/openjdk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -206596,7 +207884,7 @@ def _index_opengear_get_serialize( @validate_call - def index_openjdk_get( + def index_openssh_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206633,10 +207921,10 @@ def index_openjdk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: - """Return vulnerability data stored in index \"openjdk\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -206706,7 +207994,7 @@ def index_openjdk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206737,7 +208025,7 @@ def index_openjdk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -206753,7 +208041,7 @@ def index_openjdk_get( @validate_call - def index_openjdk_get_with_http_info( + def index_openssh_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206790,10 +208078,10 @@ def index_openjdk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: - """Return vulnerability data stored in index \"openjdk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -206863,7 +208151,7 @@ def index_openjdk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206894,7 +208182,7 @@ def index_openjdk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -206910,7 +208198,7 @@ def index_openjdk_get_with_http_info( @validate_call - def index_openjdk_get_without_preload_content( + def index_openssh_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206948,9 +208236,9 @@ def index_openjdk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openjdk\" + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -207020,7 +208308,7 @@ def index_openjdk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207051,7 +208339,7 @@ def index_openjdk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -207062,7 +208350,7 @@ def index_openjdk_get_without_preload_content( return response_data.response - def _index_openjdk_get_serialize( + def _index_openssh_get_serialize( self, page, limit, @@ -207222,7 +208510,7 @@ def _index_openjdk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/openjdk', + resource_path='/index/openssh', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -207239,7 +208527,7 @@ def _index_openjdk_get_serialize( @validate_call - def index_openssh_get( + def index_openssl_secadv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207276,10 +208564,10 @@ def index_openssh_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: - """Return vulnerability data stored in index \"openssh\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -207349,7 +208637,7 @@ def index_openssh_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207380,7 +208668,7 @@ def index_openssh_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -207396,7 +208684,7 @@ def index_openssh_get( @validate_call - def index_openssh_get_with_http_info( + def index_openssl_secadv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207433,10 +208721,10 @@ def index_openssh_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: - """Return vulnerability data stored in index \"openssh\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -207506,7 +208794,7 @@ def index_openssh_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207537,7 +208825,7 @@ def index_openssh_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -207553,7 +208841,7 @@ def index_openssh_get_with_http_info( @validate_call - def index_openssh_get_without_preload_content( + def index_openssl_secadv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207591,9 +208879,9 @@ def index_openssh_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssh\" + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -207663,7 +208951,7 @@ def index_openssh_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207694,7 +208982,7 @@ def index_openssh_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -207705,7 +208993,7 @@ def index_openssh_get_without_preload_content( return response_data.response - def _index_openssh_get_serialize( + def _index_openssl_secadv_get_serialize( self, page, limit, @@ -207865,7 +209153,7 @@ def _index_openssh_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/openssh', + resource_path='/index/openssl-secadv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -207882,7 +209170,7 @@ def _index_openssh_get_serialize( @validate_call - def index_openssl_secadv_get( + def index_openstack_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207919,10 +209207,10 @@ def index_openssl_secadv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -207992,7 +209280,7 @@ def index_openssl_secadv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208023,7 +209311,7 @@ def index_openssl_secadv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -208039,7 +209327,7 @@ def index_openssl_secadv_get( @validate_call - def index_openssl_secadv_get_with_http_info( + def index_openstack_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208076,10 +209364,10 @@ def index_openssl_secadv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -208149,7 +209437,7 @@ def index_openssl_secadv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208180,7 +209468,7 @@ def index_openssl_secadv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -208196,7 +209484,7 @@ def index_openssl_secadv_get_with_http_info( @validate_call - def index_openssl_secadv_get_without_preload_content( + def index_openstack_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208234,9 +209522,9 @@ def index_openssl_secadv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssl-secadv\" + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -208306,7 +209594,7 @@ def index_openssl_secadv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208337,7 +209625,7 @@ def index_openssl_secadv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -208348,7 +209636,7 @@ def index_openssl_secadv_get_without_preload_content( return response_data.response - def _index_openssl_secadv_get_serialize( + def _index_openstack_get_serialize( self, page, limit, @@ -208508,7 +209796,7 @@ def _index_openssl_secadv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/openssl-secadv', + resource_path='/index/openstack', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -208525,7 +209813,7 @@ def _index_openssl_secadv_get_serialize( @validate_call - def index_openstack_get( + def index_openwrt_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208562,10 +209850,10 @@ def index_openstack_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: - """Return vulnerability data stored in index \"openstack\" + ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -208635,7 +209923,7 @@ def index_openstack_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208666,7 +209954,7 @@ def index_openstack_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -208682,7 +209970,7 @@ def index_openstack_get( @validate_call - def index_openstack_get_with_http_info( + def index_openwrt_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208719,10 +210007,10 @@ def index_openstack_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: - """Return vulnerability data stored in index \"openstack\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -208792,7 +210080,7 @@ def index_openstack_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208823,7 +210111,7 @@ def index_openstack_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -208839,7 +210127,7 @@ def index_openstack_get_with_http_info( @validate_call - def index_openstack_get_without_preload_content( + def index_openwrt_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208877,9 +210165,9 @@ def index_openstack_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openstack\" + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -208949,7 +210237,7 @@ def index_openstack_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208980,7 +210268,7 @@ def index_openstack_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -208991,7 +210279,7 @@ def index_openstack_get_without_preload_content( return response_data.response - def _index_openstack_get_serialize( + def _index_openwrt_get_serialize( self, page, limit, @@ -209151,7 +210439,7 @@ def _index_openstack_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/openstack', + resource_path='/index/openwrt', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -209168,7 +210456,7 @@ def _index_openstack_get_serialize( @validate_call - def index_openwrt_get( + def index_oracle_cpu_csaf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209205,10 +210493,10 @@ def index_openwrt_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: - """Return vulnerability data stored in index \"openwrt\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -209278,7 +210566,7 @@ def index_openwrt_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209309,7 +210597,7 @@ def index_openwrt_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -209325,7 +210613,7 @@ def index_openwrt_get( @validate_call - def index_openwrt_get_with_http_info( + def index_oracle_cpu_csaf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209362,10 +210650,10 @@ def index_openwrt_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: - """Return vulnerability data stored in index \"openwrt\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -209435,7 +210723,7 @@ def index_openwrt_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209466,7 +210754,7 @@ def index_openwrt_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -209482,7 +210770,7 @@ def index_openwrt_get_with_http_info( @validate_call - def index_openwrt_get_without_preload_content( + def index_oracle_cpu_csaf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209520,9 +210808,9 @@ def index_openwrt_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openwrt\" + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -209592,7 +210880,7 @@ def index_openwrt_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209623,7 +210911,7 @@ def index_openwrt_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -209634,7 +210922,7 @@ def index_openwrt_get_without_preload_content( return response_data.response - def _index_openwrt_get_serialize( + def _index_oracle_cpu_csaf_get_serialize( self, page, limit, @@ -209794,7 +211082,7 @@ def _index_openwrt_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/openwrt', + resource_path='/index/oracle-cpu-csaf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -209811,7 +211099,7 @@ def _index_openwrt_get_serialize( @validate_call - def index_oracle_cpu_csaf_get( + def index_oracle_cpu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209848,10 +211136,10 @@ def index_oracle_cpu_csaf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -209921,7 +211209,7 @@ def index_oracle_cpu_csaf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209952,7 +211240,7 @@ def index_oracle_cpu_csaf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -209968,7 +211256,7 @@ def index_oracle_cpu_csaf_get( @validate_call - def index_oracle_cpu_csaf_get_with_http_info( + def index_oracle_cpu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210005,10 +211293,10 @@ def index_oracle_cpu_csaf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -210078,7 +211366,7 @@ def index_oracle_cpu_csaf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210109,7 +211397,7 @@ def index_oracle_cpu_csaf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -210125,7 +211413,7 @@ def index_oracle_cpu_csaf_get_with_http_info( @validate_call - def index_oracle_cpu_csaf_get_without_preload_content( + def index_oracle_cpu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210163,9 +211451,9 @@ def index_oracle_cpu_csaf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -210235,7 +211523,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210266,7 +211554,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -210277,7 +211565,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( return response_data.response - def _index_oracle_cpu_csaf_get_serialize( + def _index_oracle_cpu_get_serialize( self, page, limit, @@ -210437,7 +211725,7 @@ def _index_oracle_cpu_csaf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/oracle-cpu-csaf', + resource_path='/index/oracle-cpu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -210454,164 +211742,7 @@ def _index_oracle_cpu_csaf_get_serialize( @validate_call - def index_oracle_cpu_get( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, - iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, - threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, - mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, - misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, - ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, - botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param alias: Specify a vulnerability alias to search with. - :type alias: str - :param iava: Specify an IAVA ID to search with. - :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str - :param threat_actor: Specify a threat actor name to search with. - :type threat_actor: str - :param mitre_id: Specify a MITRE ID to search with. - :type mitre_id: str - :param misp_id: Specify a MISP ID to search with. - :type misp_id: str - :param ransomware: Specify a ransomeware family name to search with. - :type ransomware: str - :param botnet: Specify a botnet name to search with. - :type botnet: str - :param published: Specify a published date - :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_oracle_cpu_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - cve=cve, - alias=alias, - iava=iava, - jvndb=jvndb, - ilvn=ilvn, - threat_actor=threat_actor, - mitre_id=mitre_id, - misp_id=misp_id, - ransomware=ransomware, - botnet=botnet, - published=published, - var_date=var_date, - var_date2=var_date2, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", - '404': "str", - '500': "str", - } - response_data = self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - response_data.read() - return self.api_client.response_deserialize( - response_data=response_data, - response_types_map=_response_types_map, - ).data - - - @validate_call - def index_oracle_cpu_get_with_http_info( + def index_oracle_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210648,10 +211779,10 @@ def index_oracle_cpu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -210721,7 +211852,7 @@ def index_oracle_cpu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210752,7 +211883,164 @@ def index_oracle_cpu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_oracle_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: + """Return vulnerability data stored in index \"oracle\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param var_date: Specify a starting published date to filter with. + :type var_date: str + :param var_date2: Specify an ending published date to filter with. + :type var_date2: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_oracle_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + var_date=var_date, + var_date2=var_date2, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -210768,7 +212056,7 @@ def index_oracle_cpu_get_with_http_info( @validate_call - def index_oracle_cpu_get_without_preload_content( + def index_oracle_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210806,9 +212094,9 @@ def index_oracle_cpu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu\" + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -210878,7 +212166,7 @@ def index_oracle_cpu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210909,7 +212197,7 @@ def index_oracle_cpu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -210920,7 +212208,7 @@ def index_oracle_cpu_get_without_preload_content( return response_data.response - def _index_oracle_cpu_get_serialize( + def _index_oracle_get_serialize( self, page, limit, @@ -211080,7 +212368,7 @@ def _index_oracle_cpu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/oracle-cpu', + resource_path='/index/oracle', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -211097,7 +212385,7 @@ def _index_oracle_cpu_get_serialize( @validate_call - def index_oracle_get( + def index_osv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211134,10 +212422,10 @@ def index_oracle_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: - """Return vulnerability data stored in index \"oracle\" + ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -211207,7 +212495,7 @@ def index_oracle_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211238,7 +212526,7 @@ def index_oracle_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -211254,7 +212542,7 @@ def index_oracle_get( @validate_call - def index_oracle_get_with_http_info( + def index_osv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211291,10 +212579,10 @@ def index_oracle_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: - """Return vulnerability data stored in index \"oracle\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -211364,7 +212652,7 @@ def index_oracle_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211395,7 +212683,7 @@ def index_oracle_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -211411,7 +212699,7 @@ def index_oracle_get_with_http_info( @validate_call - def index_oracle_get_without_preload_content( + def index_osv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211449,9 +212737,9 @@ def index_oracle_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle\" + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -211521,7 +212809,7 @@ def index_oracle_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211552,7 +212840,7 @@ def index_oracle_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -211563,7 +212851,7 @@ def index_oracle_get_without_preload_content( return response_data.response - def _index_oracle_get_serialize( + def _index_osv_get_serialize( self, page, limit, @@ -211723,7 +213011,7 @@ def _index_oracle_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/oracle', + resource_path='/index/osv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -211740,7 +213028,7 @@ def _index_oracle_get_serialize( @validate_call - def index_osv_get( + def index_otrs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211777,10 +213065,10 @@ def index_osv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: - """Return vulnerability data stored in index \"osv\" + ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -211850,7 +213138,7 @@ def index_osv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211881,7 +213169,7 @@ def index_osv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -211897,7 +213185,7 @@ def index_osv_get( @validate_call - def index_osv_get_with_http_info( + def index_otrs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211934,10 +213222,10 @@ def index_osv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: - """Return vulnerability data stored in index \"osv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -212007,7 +213295,7 @@ def index_osv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212038,7 +213326,7 @@ def index_osv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -212054,7 +213342,7 @@ def index_osv_get_with_http_info( @validate_call - def index_osv_get_without_preload_content( + def index_otrs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212092,9 +213380,9 @@ def index_osv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"osv\" + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -212164,7 +213452,7 @@ def index_osv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212195,7 +213483,7 @@ def index_osv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -212206,7 +213494,7 @@ def index_osv_get_without_preload_content( return response_data.response - def _index_osv_get_serialize( + def _index_otrs_get_serialize( self, page, limit, @@ -212366,7 +213654,7 @@ def _index_osv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/osv', + resource_path='/index/otrs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -212383,7 +213671,7 @@ def _index_osv_get_serialize( @validate_call - def index_otrs_get( + def index_owncloud_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212420,10 +213708,10 @@ def index_otrs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: - """Return vulnerability data stored in index \"otrs\" + ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -212493,7 +213781,7 @@ def index_otrs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212524,7 +213812,7 @@ def index_otrs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -212540,7 +213828,7 @@ def index_otrs_get( @validate_call - def index_otrs_get_with_http_info( + def index_owncloud_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212577,10 +213865,10 @@ def index_otrs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: - """Return vulnerability data stored in index \"otrs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -212650,7 +213938,7 @@ def index_otrs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212681,7 +213969,7 @@ def index_otrs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -212697,7 +213985,7 @@ def index_otrs_get_with_http_info( @validate_call - def index_otrs_get_without_preload_content( + def index_owncloud_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212735,9 +214023,9 @@ def index_otrs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"otrs\" + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -212807,7 +214095,7 @@ def index_otrs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212838,7 +214126,7 @@ def index_otrs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -212849,7 +214137,7 @@ def index_otrs_get_without_preload_content( return response_data.response - def _index_otrs_get_serialize( + def _index_owncloud_get_serialize( self, page, limit, @@ -213009,7 +214297,7 @@ def _index_otrs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/otrs', + resource_path='/index/owncloud', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213026,7 +214314,7 @@ def _index_otrs_get_serialize( @validate_call - def index_owncloud_get( + def index_packetstorm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213063,10 +214351,10 @@ def index_owncloud_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: - """Return vulnerability data stored in index \"owncloud\" + ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -213136,7 +214424,7 @@ def index_owncloud_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213167,7 +214455,7 @@ def index_owncloud_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -213183,7 +214471,7 @@ def index_owncloud_get( @validate_call - def index_owncloud_get_with_http_info( + def index_packetstorm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213220,10 +214508,10 @@ def index_owncloud_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: - """Return vulnerability data stored in index \"owncloud\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -213293,7 +214581,7 @@ def index_owncloud_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213324,7 +214612,7 @@ def index_owncloud_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -213340,7 +214628,7 @@ def index_owncloud_get_with_http_info( @validate_call - def index_owncloud_get_without_preload_content( + def index_packetstorm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213378,9 +214666,9 @@ def index_owncloud_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"owncloud\" + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -213450,7 +214738,7 @@ def index_owncloud_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213481,7 +214769,7 @@ def index_owncloud_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -213492,7 +214780,7 @@ def index_owncloud_get_without_preload_content( return response_data.response - def _index_owncloud_get_serialize( + def _index_packetstorm_get_serialize( self, page, limit, @@ -213652,7 +214940,7 @@ def _index_owncloud_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/owncloud', + resource_path='/index/packetstorm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213669,7 +214957,7 @@ def _index_owncloud_get_serialize( @validate_call - def index_packetstorm_get( + def index_palantir_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213706,10 +214994,10 @@ def index_packetstorm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: - """Return vulnerability data stored in index \"packetstorm\" + ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -213779,7 +215067,7 @@ def index_packetstorm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213810,7 +215098,7 @@ def index_packetstorm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -213826,7 +215114,7 @@ def index_packetstorm_get( @validate_call - def index_packetstorm_get_with_http_info( + def index_palantir_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213863,10 +215151,10 @@ def index_packetstorm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: - """Return vulnerability data stored in index \"packetstorm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -213936,7 +215224,7 @@ def index_packetstorm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213967,7 +215255,7 @@ def index_packetstorm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -213983,7 +215271,7 @@ def index_packetstorm_get_with_http_info( @validate_call - def index_packetstorm_get_without_preload_content( + def index_palantir_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214021,9 +215309,9 @@ def index_packetstorm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"packetstorm\" + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -214093,7 +215381,7 @@ def index_packetstorm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214124,7 +215412,7 @@ def index_packetstorm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -214135,7 +215423,7 @@ def index_packetstorm_get_without_preload_content( return response_data.response - def _index_packetstorm_get_serialize( + def _index_palantir_get_serialize( self, page, limit, @@ -214295,7 +215583,7 @@ def _index_packetstorm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/packetstorm', + resource_path='/index/palantir', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214312,7 +215600,7 @@ def _index_packetstorm_get_serialize( @validate_call - def index_palantir_get( + def index_palo_alto_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214349,10 +215637,10 @@ def index_palantir_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: - """Return vulnerability data stored in index \"palantir\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -214422,7 +215710,7 @@ def index_palantir_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214453,7 +215741,7 @@ def index_palantir_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -214469,7 +215757,7 @@ def index_palantir_get( @validate_call - def index_palantir_get_with_http_info( + def index_palo_alto_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214506,10 +215794,10 @@ def index_palantir_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: - """Return vulnerability data stored in index \"palantir\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -214579,7 +215867,7 @@ def index_palantir_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214610,7 +215898,7 @@ def index_palantir_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -214626,7 +215914,7 @@ def index_palantir_get_with_http_info( @validate_call - def index_palantir_get_without_preload_content( + def index_palo_alto_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214664,9 +215952,9 @@ def index_palantir_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palantir\" + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -214736,7 +216024,7 @@ def index_palantir_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214767,7 +216055,7 @@ def index_palantir_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -214778,7 +216066,7 @@ def index_palantir_get_without_preload_content( return response_data.response - def _index_palantir_get_serialize( + def _index_palo_alto_get_serialize( self, page, limit, @@ -214938,7 +216226,7 @@ def _index_palantir_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/palantir', + resource_path='/index/palo-alto', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214955,7 +216243,7 @@ def _index_palantir_get_serialize( @validate_call - def index_palo_alto_get( + def index_panasonic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214992,10 +216280,10 @@ def index_palo_alto_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"palo-alto\" + ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -215065,7 +216353,7 @@ def index_palo_alto_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215096,7 +216384,7 @@ def index_palo_alto_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -215112,7 +216400,7 @@ def index_palo_alto_get( @validate_call - def index_palo_alto_get_with_http_info( + def index_panasonic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215149,10 +216437,10 @@ def index_palo_alto_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"palo-alto\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -215222,7 +216510,7 @@ def index_palo_alto_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215253,7 +216541,7 @@ def index_palo_alto_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -215269,7 +216557,7 @@ def index_palo_alto_get_with_http_info( @validate_call - def index_palo_alto_get_without_preload_content( + def index_panasonic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215307,9 +216595,9 @@ def index_palo_alto_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palo-alto\" + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -215379,7 +216667,7 @@ def index_palo_alto_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215410,7 +216698,7 @@ def index_palo_alto_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -215421,7 +216709,7 @@ def index_palo_alto_get_without_preload_content( return response_data.response - def _index_palo_alto_get_serialize( + def _index_panasonic_get_serialize( self, page, limit, @@ -215581,7 +216869,7 @@ def _index_palo_alto_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/palo-alto', + resource_path='/index/panasonic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -215598,7 +216886,7 @@ def _index_palo_alto_get_serialize( @validate_call - def index_panasonic_get( + def index_papercut_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215635,10 +216923,10 @@ def index_panasonic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: - """Return vulnerability data stored in index \"panasonic\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -215708,7 +216996,7 @@ def index_panasonic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215739,7 +217027,7 @@ def index_panasonic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -215755,7 +217043,7 @@ def index_panasonic_get( @validate_call - def index_panasonic_get_with_http_info( + def index_papercut_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215792,10 +217080,10 @@ def index_panasonic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: - """Return vulnerability data stored in index \"panasonic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -215865,7 +217153,7 @@ def index_panasonic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215896,7 +217184,7 @@ def index_panasonic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -215912,7 +217200,7 @@ def index_panasonic_get_with_http_info( @validate_call - def index_panasonic_get_without_preload_content( + def index_papercut_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215950,9 +217238,9 @@ def index_panasonic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"panasonic\" + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -216022,7 +217310,7 @@ def index_panasonic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216053,7 +217341,7 @@ def index_panasonic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -216064,7 +217352,7 @@ def index_panasonic_get_without_preload_content( return response_data.response - def _index_panasonic_get_serialize( + def _index_papercut_get_serialize( self, page, limit, @@ -216224,7 +217512,7 @@ def _index_panasonic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/panasonic', + resource_path='/index/papercut', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216241,7 +217529,7 @@ def _index_panasonic_get_serialize( @validate_call - def index_papercut_get( + def index_pega_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216278,10 +217566,10 @@ def index_papercut_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: - """Return vulnerability data stored in index \"papercut\" + ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -216351,7 +217639,7 @@ def index_papercut_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216382,7 +217670,7 @@ def index_papercut_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -216398,7 +217686,7 @@ def index_papercut_get( @validate_call - def index_papercut_get_with_http_info( + def index_pega_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216435,10 +217723,10 @@ def index_papercut_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: - """Return vulnerability data stored in index \"papercut\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -216508,7 +217796,7 @@ def index_papercut_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216539,7 +217827,7 @@ def index_papercut_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -216555,7 +217843,7 @@ def index_papercut_get_with_http_info( @validate_call - def index_papercut_get_without_preload_content( + def index_pega_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216593,9 +217881,9 @@ def index_papercut_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"papercut\" + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -216665,7 +217953,7 @@ def index_papercut_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216696,7 +217984,7 @@ def index_papercut_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -216707,7 +217995,7 @@ def index_papercut_get_without_preload_content( return response_data.response - def _index_papercut_get_serialize( + def _index_pega_get_serialize( self, page, limit, @@ -216867,7 +218155,7 @@ def _index_papercut_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/papercut', + resource_path='/index/pega', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216884,7 +218172,7 @@ def _index_papercut_get_serialize( @validate_call - def index_pega_get( + def index_philips_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216921,10 +218209,10 @@ def index_pega_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: - """Return vulnerability data stored in index \"pega\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -216994,7 +218282,7 @@ def index_pega_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217025,7 +218313,7 @@ def index_pega_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -217041,7 +218329,7 @@ def index_pega_get( @validate_call - def index_pega_get_with_http_info( + def index_philips_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217078,10 +218366,10 @@ def index_pega_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: - """Return vulnerability data stored in index \"pega\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -217151,7 +218439,7 @@ def index_pega_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217182,7 +218470,7 @@ def index_pega_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -217198,7 +218486,7 @@ def index_pega_get_with_http_info( @validate_call - def index_pega_get_without_preload_content( + def index_philips_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217236,9 +218524,9 @@ def index_pega_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pega\" + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -217308,7 +218596,7 @@ def index_pega_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217339,7 +218627,7 @@ def index_pega_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -217350,7 +218638,7 @@ def index_pega_get_without_preload_content( return response_data.response - def _index_pega_get_serialize( + def _index_philips_get_serialize( self, page, limit, @@ -217510,7 +218798,7 @@ def _index_pega_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/pega', + resource_path='/index/philips', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -217527,7 +218815,7 @@ def _index_pega_get_serialize( @validate_call - def index_philips_get( + def index_phoenix_contact_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217564,10 +218852,10 @@ def index_philips_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"philips\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -217637,7 +218925,7 @@ def index_philips_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217668,7 +218956,7 @@ def index_philips_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -217684,7 +218972,7 @@ def index_philips_get( @validate_call - def index_philips_get_with_http_info( + def index_phoenix_contact_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217721,10 +219009,10 @@ def index_philips_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"philips\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -217794,7 +219082,7 @@ def index_philips_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217825,7 +219113,7 @@ def index_philips_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -217841,7 +219129,7 @@ def index_philips_get_with_http_info( @validate_call - def index_philips_get_without_preload_content( + def index_phoenix_contact_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217879,9 +219167,9 @@ def index_philips_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"philips\" + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -217951,7 +219239,7 @@ def index_philips_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217982,7 +219270,7 @@ def index_philips_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -217993,7 +219281,7 @@ def index_philips_get_without_preload_content( return response_data.response - def _index_philips_get_serialize( + def _index_phoenix_contact_get_serialize( self, page, limit, @@ -218153,7 +219441,7 @@ def _index_philips_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/philips', + resource_path='/index/phoenix-contact', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218170,7 +219458,7 @@ def _index_philips_get_serialize( @validate_call - def index_phoenix_contact_get( + def index_php_my_admin_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218207,10 +219495,10 @@ def index_phoenix_contact_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -218280,7 +219568,7 @@ def index_phoenix_contact_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218311,7 +219599,7 @@ def index_phoenix_contact_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -218327,7 +219615,7 @@ def index_phoenix_contact_get( @validate_call - def index_phoenix_contact_get_with_http_info( + def index_php_my_admin_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218364,10 +219652,10 @@ def index_phoenix_contact_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -218437,7 +219725,7 @@ def index_phoenix_contact_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218468,7 +219756,7 @@ def index_phoenix_contact_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -218484,7 +219772,7 @@ def index_phoenix_contact_get_with_http_info( @validate_call - def index_phoenix_contact_get_without_preload_content( + def index_php_my_admin_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218522,9 +219810,9 @@ def index_phoenix_contact_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"phoenix-contact\" + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -218594,7 +219882,7 @@ def index_phoenix_contact_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218625,7 +219913,7 @@ def index_phoenix_contact_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -218636,7 +219924,7 @@ def index_phoenix_contact_get_without_preload_content( return response_data.response - def _index_phoenix_contact_get_serialize( + def _index_php_my_admin_get_serialize( self, page, limit, @@ -218796,7 +220084,7 @@ def _index_phoenix_contact_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/phoenix-contact', + resource_path='/index/php-my-admin', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218813,7 +220101,7 @@ def _index_phoenix_contact_get_serialize( @validate_call - def index_php_my_admin_get( + def index_pkcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218850,10 +220138,10 @@ def index_php_my_admin_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -218923,7 +220211,7 @@ def index_php_my_admin_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218954,7 +220242,7 @@ def index_php_my_admin_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -218970,7 +220258,7 @@ def index_php_my_admin_get( @validate_call - def index_php_my_admin_get_with_http_info( + def index_pkcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219007,10 +220295,10 @@ def index_php_my_admin_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -219080,7 +220368,7 @@ def index_php_my_admin_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219111,7 +220399,7 @@ def index_php_my_admin_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -219127,7 +220415,7 @@ def index_php_my_admin_get_with_http_info( @validate_call - def index_php_my_admin_get_without_preload_content( + def index_pkcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219165,9 +220453,9 @@ def index_php_my_admin_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"php-my-admin\" + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -219237,7 +220525,7 @@ def index_php_my_admin_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219268,7 +220556,7 @@ def index_php_my_admin_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -219279,7 +220567,7 @@ def index_php_my_admin_get_without_preload_content( return response_data.response - def _index_php_my_admin_get_serialize( + def _index_pkcert_get_serialize( self, page, limit, @@ -219439,7 +220727,7 @@ def _index_php_my_admin_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/php-my-admin', + resource_path='/index/pkcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -219456,7 +220744,7 @@ def _index_php_my_admin_get_serialize( @validate_call - def index_pkcert_get( + def index_postgressql_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219493,10 +220781,10 @@ def index_pkcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: - """Return vulnerability data stored in index \"pkcert\" + ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -219566,7 +220854,7 @@ def index_pkcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219597,7 +220885,7 @@ def index_pkcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -219613,7 +220901,7 @@ def index_pkcert_get( @validate_call - def index_pkcert_get_with_http_info( + def index_postgressql_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219650,10 +220938,10 @@ def index_pkcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: - """Return vulnerability data stored in index \"pkcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -219723,7 +221011,7 @@ def index_pkcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219754,7 +221042,7 @@ def index_pkcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -219770,7 +221058,7 @@ def index_pkcert_get_with_http_info( @validate_call - def index_pkcert_get_without_preload_content( + def index_postgressql_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219808,9 +221096,9 @@ def index_pkcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pkcert\" + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -219880,7 +221168,7 @@ def index_pkcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219911,7 +221199,7 @@ def index_pkcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -219922,7 +221210,7 @@ def index_pkcert_get_without_preload_content( return response_data.response - def _index_pkcert_get_serialize( + def _index_postgressql_get_serialize( self, page, limit, @@ -220082,7 +221370,7 @@ def _index_pkcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/pkcert', + resource_path='/index/postgressql', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220099,7 +221387,7 @@ def _index_pkcert_get_serialize( @validate_call - def index_postgressql_get( + def index_powerdns_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220136,10 +221424,10 @@ def index_postgressql_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: - """Return vulnerability data stored in index \"postgressql\" + ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -220209,7 +221497,7 @@ def index_postgressql_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220240,7 +221528,7 @@ def index_postgressql_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -220256,7 +221544,7 @@ def index_postgressql_get( @validate_call - def index_postgressql_get_with_http_info( + def index_powerdns_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220293,10 +221581,10 @@ def index_postgressql_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: - """Return vulnerability data stored in index \"postgressql\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -220366,7 +221654,7 @@ def index_postgressql_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220397,7 +221685,7 @@ def index_postgressql_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -220413,7 +221701,7 @@ def index_postgressql_get_with_http_info( @validate_call - def index_postgressql_get_without_preload_content( + def index_powerdns_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220451,9 +221739,9 @@ def index_postgressql_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"postgressql\" + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -220523,7 +221811,7 @@ def index_postgressql_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220554,7 +221842,7 @@ def index_postgressql_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -220565,7 +221853,7 @@ def index_postgressql_get_without_preload_content( return response_data.response - def _index_postgressql_get_serialize( + def _index_powerdns_get_serialize( self, page, limit, @@ -220725,7 +222013,7 @@ def _index_postgressql_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/postgressql', + resource_path='/index/powerdns', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220742,7 +222030,7 @@ def _index_postgressql_get_serialize( @validate_call - def index_powerdns_get( + def index_progress_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220779,10 +222067,10 @@ def index_powerdns_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: - """Return vulnerability data stored in index \"powerdns\" + ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -220852,7 +222140,7 @@ def index_powerdns_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220883,7 +222171,7 @@ def index_powerdns_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -220899,7 +222187,7 @@ def index_powerdns_get( @validate_call - def index_powerdns_get_with_http_info( + def index_progress_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220936,10 +222224,10 @@ def index_powerdns_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: - """Return vulnerability data stored in index \"powerdns\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -221009,7 +222297,7 @@ def index_powerdns_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221040,7 +222328,7 @@ def index_powerdns_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -221056,7 +222344,7 @@ def index_powerdns_get_with_http_info( @validate_call - def index_powerdns_get_without_preload_content( + def index_progress_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221094,9 +222382,9 @@ def index_powerdns_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"powerdns\" + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -221166,7 +222454,7 @@ def index_powerdns_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221197,7 +222485,7 @@ def index_powerdns_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -221208,7 +222496,7 @@ def index_powerdns_get_without_preload_content( return response_data.response - def _index_powerdns_get_serialize( + def _index_progress_get_serialize( self, page, limit, @@ -221368,7 +222656,7 @@ def _index_powerdns_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/powerdns', + resource_path='/index/progress', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -221385,7 +222673,7 @@ def _index_powerdns_get_serialize( @validate_call - def index_progress_get( + def index_proofpoint_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221422,10 +222710,10 @@ def index_progress_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: - """Return vulnerability data stored in index \"progress\" + ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -221495,7 +222783,7 @@ def index_progress_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221526,7 +222814,7 @@ def index_progress_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -221542,7 +222830,7 @@ def index_progress_get( @validate_call - def index_progress_get_with_http_info( + def index_proofpoint_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221579,10 +222867,10 @@ def index_progress_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: - """Return vulnerability data stored in index \"progress\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -221652,7 +222940,7 @@ def index_progress_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221683,7 +222971,7 @@ def index_progress_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -221699,7 +222987,7 @@ def index_progress_get_with_http_info( @validate_call - def index_progress_get_without_preload_content( + def index_proofpoint_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221737,9 +223025,9 @@ def index_progress_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"progress\" + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -221809,7 +223097,7 @@ def index_progress_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221840,7 +223128,7 @@ def index_progress_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -221851,7 +223139,7 @@ def index_progress_get_without_preload_content( return response_data.response - def _index_progress_get_serialize( + def _index_proofpoint_get_serialize( self, page, limit, @@ -222011,7 +223299,7 @@ def _index_progress_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/progress', + resource_path='/index/proofpoint', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222028,7 +223316,7 @@ def _index_progress_get_serialize( @validate_call - def index_proofpoint_get( + def index_ptc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222065,10 +223353,10 @@ def index_proofpoint_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: - """Return vulnerability data stored in index \"proofpoint\" + ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -222138,7 +223426,7 @@ def index_proofpoint_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222169,7 +223457,7 @@ def index_proofpoint_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -222185,7 +223473,7 @@ def index_proofpoint_get( @validate_call - def index_proofpoint_get_with_http_info( + def index_ptc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222222,10 +223510,10 @@ def index_proofpoint_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: - """Return vulnerability data stored in index \"proofpoint\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -222295,7 +223583,7 @@ def index_proofpoint_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222326,7 +223614,7 @@ def index_proofpoint_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -222342,7 +223630,7 @@ def index_proofpoint_get_with_http_info( @validate_call - def index_proofpoint_get_without_preload_content( + def index_ptc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222380,9 +223668,9 @@ def index_proofpoint_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"proofpoint\" + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -222452,7 +223740,7 @@ def index_proofpoint_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222483,7 +223771,7 @@ def index_proofpoint_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -222494,7 +223782,7 @@ def index_proofpoint_get_without_preload_content( return response_data.response - def _index_proofpoint_get_serialize( + def _index_ptc_get_serialize( self, page, limit, @@ -222654,7 +223942,7 @@ def _index_proofpoint_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/proofpoint', + resource_path='/index/ptc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222671,7 +223959,7 @@ def _index_proofpoint_get_serialize( @validate_call - def index_ptc_get( + def index_pub_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222708,10 +223996,10 @@ def index_ptc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: - """Return vulnerability data stored in index \"ptc\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -222781,7 +224069,7 @@ def index_ptc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222812,7 +224100,7 @@ def index_ptc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -222828,7 +224116,7 @@ def index_ptc_get( @validate_call - def index_ptc_get_with_http_info( + def index_pub_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222865,10 +224153,10 @@ def index_ptc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: - """Return vulnerability data stored in index \"ptc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -222938,7 +224226,7 @@ def index_ptc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222969,7 +224257,7 @@ def index_ptc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -222985,7 +224273,7 @@ def index_ptc_get_with_http_info( @validate_call - def index_ptc_get_without_preload_content( + def index_pub_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223023,9 +224311,9 @@ def index_ptc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ptc\" + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -223095,7 +224383,7 @@ def index_ptc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223126,7 +224414,7 @@ def index_ptc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -223137,7 +224425,7 @@ def index_ptc_get_without_preload_content( return response_data.response - def _index_ptc_get_serialize( + def _index_pub_get_serialize( self, page, limit, @@ -223297,7 +224585,7 @@ def _index_ptc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ptc', + resource_path='/index/pub', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -223314,7 +224602,7 @@ def _index_ptc_get_serialize( @validate_call - def index_pub_get( + def index_pure_storage_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223351,10 +224639,10 @@ def index_pub_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pub\" + ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -223424,7 +224712,7 @@ def index_pub_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223455,7 +224743,7 @@ def index_pub_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -223471,7 +224759,7 @@ def index_pub_get( @validate_call - def index_pub_get_with_http_info( + def index_pure_storage_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223508,10 +224796,10 @@ def index_pub_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pub\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -223581,7 +224869,7 @@ def index_pub_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223612,7 +224900,7 @@ def index_pub_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -223628,7 +224916,7 @@ def index_pub_get_with_http_info( @validate_call - def index_pub_get_without_preload_content( + def index_pure_storage_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223666,9 +224954,9 @@ def index_pub_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pub\" + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -223738,7 +225026,7 @@ def index_pub_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223769,7 +225057,7 @@ def index_pub_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -223780,7 +225068,7 @@ def index_pub_get_without_preload_content( return response_data.response - def _index_pub_get_serialize( + def _index_pure_storage_get_serialize( self, page, limit, @@ -223940,7 +225228,7 @@ def _index_pub_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/pub', + resource_path='/index/pure-storage', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -223957,7 +225245,7 @@ def _index_pub_get_serialize( @validate_call - def index_pure_storage_get( + def index_pypa_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223994,10 +225282,10 @@ def index_pure_storage_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: - """Return vulnerability data stored in index \"pure-storage\" + ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -224067,7 +225355,7 @@ def index_pure_storage_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224098,7 +225386,7 @@ def index_pure_storage_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -224114,7 +225402,7 @@ def index_pure_storage_get( @validate_call - def index_pure_storage_get_with_http_info( + def index_pypa_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224151,10 +225439,10 @@ def index_pure_storage_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: - """Return vulnerability data stored in index \"pure-storage\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -224224,7 +225512,7 @@ def index_pure_storage_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224255,7 +225543,7 @@ def index_pure_storage_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -224271,7 +225559,7 @@ def index_pure_storage_get_with_http_info( @validate_call - def index_pure_storage_get_without_preload_content( + def index_pypa_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224309,9 +225597,9 @@ def index_pure_storage_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pure-storage\" + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -224381,7 +225669,7 @@ def index_pure_storage_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224412,7 +225700,7 @@ def index_pure_storage_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -224423,7 +225711,7 @@ def index_pure_storage_get_without_preload_content( return response_data.response - def _index_pure_storage_get_serialize( + def _index_pypa_advisories_get_serialize( self, page, limit, @@ -224583,7 +225871,7 @@ def _index_pure_storage_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/pure-storage', + resource_path='/index/pypa-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -224600,7 +225888,7 @@ def _index_pure_storage_get_serialize( @validate_call - def index_pypa_advisories_get( + def index_pypi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224637,10 +225925,10 @@ def index_pypa_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -224710,7 +225998,7 @@ def index_pypa_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224741,7 +226029,7 @@ def index_pypa_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -224757,7 +226045,7 @@ def index_pypa_advisories_get( @validate_call - def index_pypa_advisories_get_with_http_info( + def index_pypi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224794,10 +226082,10 @@ def index_pypa_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -224867,7 +226155,7 @@ def index_pypa_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224898,7 +226186,7 @@ def index_pypa_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -224914,7 +226202,7 @@ def index_pypa_advisories_get_with_http_info( @validate_call - def index_pypa_advisories_get_without_preload_content( + def index_pypi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224952,9 +226240,9 @@ def index_pypa_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypa-advisories\" + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -225024,7 +226312,7 @@ def index_pypa_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225055,7 +226343,7 @@ def index_pypa_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -225066,7 +226354,7 @@ def index_pypa_advisories_get_without_preload_content( return response_data.response - def _index_pypa_advisories_get_serialize( + def _index_pypi_get_serialize( self, page, limit, @@ -225226,7 +226514,7 @@ def _index_pypa_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/pypa-advisories', + resource_path='/index/pypi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -225243,7 +226531,7 @@ def _index_pypa_advisories_get_serialize( @validate_call - def index_pypi_get( + def index_qnap_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225280,10 +226568,10 @@ def index_pypi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pypi\" + ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -225353,7 +226641,7 @@ def index_pypi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225384,7 +226672,7 @@ def index_pypi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -225400,7 +226688,7 @@ def index_pypi_get( @validate_call - def index_pypi_get_with_http_info( + def index_qnap_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225437,10 +226725,10 @@ def index_pypi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pypi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -225510,7 +226798,7 @@ def index_pypi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225541,7 +226829,7 @@ def index_pypi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -225557,7 +226845,7 @@ def index_pypi_get_with_http_info( @validate_call - def index_pypi_get_without_preload_content( + def index_qnap_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225595,9 +226883,9 @@ def index_pypi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypi\" + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -225667,7 +226955,7 @@ def index_pypi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225698,7 +226986,7 @@ def index_pypi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -225709,7 +226997,7 @@ def index_pypi_get_without_preload_content( return response_data.response - def _index_pypi_get_serialize( + def _index_qnap_get_serialize( self, page, limit, @@ -225869,7 +227157,7 @@ def _index_pypi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/pypi', + resource_path='/index/qnap', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -225886,7 +227174,7 @@ def _index_pypi_get_serialize( @validate_call - def index_qnap_get( + def index_qqids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225923,10 +227211,10 @@ def index_qnap_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"qnap\" + ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -225996,7 +227284,7 @@ def index_qnap_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226027,7 +227315,7 @@ def index_qnap_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -226043,7 +227331,7 @@ def index_qnap_get( @validate_call - def index_qnap_get_with_http_info( + def index_qqids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226080,10 +227368,10 @@ def index_qnap_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"qnap\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -226153,7 +227441,7 @@ def index_qnap_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226184,7 +227472,7 @@ def index_qnap_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -226200,7 +227488,7 @@ def index_qnap_get_with_http_info( @validate_call - def index_qnap_get_without_preload_content( + def index_qqids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226238,9 +227526,9 @@ def index_qnap_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qnap\" + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -226310,7 +227598,7 @@ def index_qnap_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226341,7 +227629,7 @@ def index_qnap_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -226352,7 +227640,7 @@ def index_qnap_get_without_preload_content( return response_data.response - def _index_qnap_get_serialize( + def _index_qqids_get_serialize( self, page, limit, @@ -226512,7 +227800,7 @@ def _index_qnap_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/qnap', + resource_path='/index/qqids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -226529,7 +227817,7 @@ def _index_qnap_get_serialize( @validate_call - def index_qqids_get( + def index_qualcomm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226566,10 +227854,10 @@ def index_qqids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: - """Return vulnerability data stored in index \"qqids\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -226639,7 +227927,7 @@ def index_qqids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226670,7 +227958,7 @@ def index_qqids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -226686,7 +227974,7 @@ def index_qqids_get( @validate_call - def index_qqids_get_with_http_info( + def index_qualcomm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226723,10 +228011,10 @@ def index_qqids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: - """Return vulnerability data stored in index \"qqids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -226796,7 +228084,7 @@ def index_qqids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226827,7 +228115,7 @@ def index_qqids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -226843,7 +228131,7 @@ def index_qqids_get_with_http_info( @validate_call - def index_qqids_get_without_preload_content( + def index_qualcomm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226881,9 +228169,9 @@ def index_qqids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qqids\" + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -226953,7 +228241,7 @@ def index_qqids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226984,7 +228272,7 @@ def index_qqids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -226995,7 +228283,7 @@ def index_qqids_get_without_preload_content( return response_data.response - def _index_qqids_get_serialize( + def _index_qualcomm_get_serialize( self, page, limit, @@ -227155,7 +228443,7 @@ def _index_qqids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/qqids', + resource_path='/index/qualcomm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -227172,7 +228460,7 @@ def _index_qqids_get_serialize( @validate_call - def index_qualcomm_get( + def index_qualys_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227209,10 +228497,10 @@ def index_qualcomm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: - """Return vulnerability data stored in index \"qualcomm\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -227282,7 +228570,7 @@ def index_qualcomm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227313,7 +228601,7 @@ def index_qualcomm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -227329,7 +228617,7 @@ def index_qualcomm_get( @validate_call - def index_qualcomm_get_with_http_info( + def index_qualys_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227366,10 +228654,10 @@ def index_qualcomm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: - """Return vulnerability data stored in index \"qualcomm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -227439,7 +228727,7 @@ def index_qualcomm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227470,7 +228758,7 @@ def index_qualcomm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -227486,7 +228774,7 @@ def index_qualcomm_get_with_http_info( @validate_call - def index_qualcomm_get_without_preload_content( + def index_qualys_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227524,9 +228812,9 @@ def index_qualcomm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualcomm\" + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -227596,7 +228884,7 @@ def index_qualcomm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227627,7 +228915,7 @@ def index_qualcomm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -227638,7 +228926,7 @@ def index_qualcomm_get_without_preload_content( return response_data.response - def _index_qualcomm_get_serialize( + def _index_qualys_get_serialize( self, page, limit, @@ -227798,7 +229086,7 @@ def _index_qualcomm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/qualcomm', + resource_path='/index/qualys', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -227815,7 +229103,7 @@ def _index_qualcomm_get_serialize( @validate_call - def index_qualys_get( + def index_qualys_qids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227852,10 +229140,10 @@ def index_qualys_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: - """Return vulnerability data stored in index \"qualys\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -227925,7 +229213,7 @@ def index_qualys_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227956,7 +229244,7 @@ def index_qualys_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -227972,7 +229260,7 @@ def index_qualys_get( @validate_call - def index_qualys_get_with_http_info( + def index_qualys_qids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228009,10 +229297,10 @@ def index_qualys_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: - """Return vulnerability data stored in index \"qualys\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -228082,7 +229370,7 @@ def index_qualys_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228113,7 +229401,7 @@ def index_qualys_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -228129,7 +229417,7 @@ def index_qualys_get_with_http_info( @validate_call - def index_qualys_get_without_preload_content( + def index_qualys_qids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228167,9 +229455,9 @@ def index_qualys_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys\" + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -228239,7 +229527,7 @@ def index_qualys_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228270,7 +229558,7 @@ def index_qualys_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -228281,7 +229569,7 @@ def index_qualys_get_without_preload_content( return response_data.response - def _index_qualys_get_serialize( + def _index_qualys_qids_get_serialize( self, page, limit, @@ -228441,7 +229729,7 @@ def _index_qualys_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/qualys', + resource_path='/index/qualys-qids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -228458,7 +229746,7 @@ def _index_qualys_get_serialize( @validate_call - def index_qualys_qids_get( + def index_qubes_qsb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228495,10 +229783,10 @@ def index_qualys_qids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -228568,7 +229856,7 @@ def index_qualys_qids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228599,7 +229887,7 @@ def index_qualys_qids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -228615,7 +229903,7 @@ def index_qualys_qids_get( @validate_call - def index_qualys_qids_get_with_http_info( + def index_qubes_qsb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228652,10 +229940,10 @@ def index_qualys_qids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -228725,7 +230013,7 @@ def index_qualys_qids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228756,7 +230044,7 @@ def index_qualys_qids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -228772,7 +230060,7 @@ def index_qualys_qids_get_with_http_info( @validate_call - def index_qualys_qids_get_without_preload_content( + def index_qubes_qsb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228810,9 +230098,9 @@ def index_qualys_qids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys-qids\" + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -228882,7 +230170,7 @@ def index_qualys_qids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228913,7 +230201,7 @@ def index_qualys_qids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -228924,7 +230212,7 @@ def index_qualys_qids_get_without_preload_content( return response_data.response - def _index_qualys_qids_get_serialize( + def _index_qubes_qsb_get_serialize( self, page, limit, @@ -229084,7 +230372,7 @@ def _index_qualys_qids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/qualys-qids', + resource_path='/index/qubes-qsb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -229101,7 +230389,7 @@ def _index_qualys_qids_get_serialize( @validate_call - def index_qubes_qsb_get( + def index_ransomware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229138,10 +230426,10 @@ def index_qubes_qsb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -229211,7 +230499,7 @@ def index_qubes_qsb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229242,7 +230530,7 @@ def index_qubes_qsb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -229258,7 +230546,7 @@ def index_qubes_qsb_get( @validate_call - def index_qubes_qsb_get_with_http_info( + def index_ransomware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229295,10 +230583,10 @@ def index_qubes_qsb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -229368,7 +230656,7 @@ def index_qubes_qsb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229399,7 +230687,7 @@ def index_qubes_qsb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -229415,7 +230703,7 @@ def index_qubes_qsb_get_with_http_info( @validate_call - def index_qubes_qsb_get_without_preload_content( + def index_ransomware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229453,9 +230741,9 @@ def index_qubes_qsb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qubes-qsb\" + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -229525,7 +230813,7 @@ def index_qubes_qsb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229556,7 +230844,7 @@ def index_qubes_qsb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -229567,7 +230855,7 @@ def index_qubes_qsb_get_without_preload_content( return response_data.response - def _index_qubes_qsb_get_serialize( + def _index_ransomware_get_serialize( self, page, limit, @@ -229727,7 +231015,7 @@ def _index_qubes_qsb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/qubes-qsb', + resource_path='/index/ransomware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -229744,7 +231032,7 @@ def _index_qubes_qsb_get_serialize( @validate_call - def index_ransomware_get( + def index_red_lion_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229781,10 +231069,10 @@ def index_ransomware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: - """Return vulnerability data stored in index \"ransomware\" + ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -229854,7 +231142,7 @@ def index_ransomware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229885,7 +231173,7 @@ def index_ransomware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -229901,7 +231189,7 @@ def index_ransomware_get( @validate_call - def index_ransomware_get_with_http_info( + def index_red_lion_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229938,10 +231226,10 @@ def index_ransomware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: - """Return vulnerability data stored in index \"ransomware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -230011,7 +231299,7 @@ def index_ransomware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230042,7 +231330,7 @@ def index_ransomware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -230058,7 +231346,7 @@ def index_ransomware_get_with_http_info( @validate_call - def index_ransomware_get_without_preload_content( + def index_red_lion_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230096,9 +231384,9 @@ def index_ransomware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ransomware\" + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -230168,7 +231456,7 @@ def index_ransomware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230199,7 +231487,7 @@ def index_ransomware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -230210,7 +231498,7 @@ def index_ransomware_get_without_preload_content( return response_data.response - def _index_ransomware_get_serialize( + def _index_red_lion_get_serialize( self, page, limit, @@ -230370,7 +231658,7 @@ def _index_ransomware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/index/ransomware', + resource_path='/index/red-lion', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/vulncheck_sdk/api_client.py b/vulncheck_sdk/api_client.py index 0b07b73..a1f9536 100644 --- a/vulncheck_sdk/api_client.py +++ b/vulncheck_sdk/api_client.py @@ -91,7 +91,7 @@ def __init__( self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/0.0.35/python' + self.user_agent = 'OpenAPI-Generator/0.0.36/python' self.client_side_validation = configuration.client_side_validation def __enter__(self): diff --git a/vulncheck_sdk/configuration.py b/vulncheck_sdk/configuration.py index 0dbaa5e..42dc8a7 100644 --- a/vulncheck_sdk/configuration.py +++ b/vulncheck_sdk/configuration.py @@ -532,7 +532,7 @@ def to_debug_report(self) -> str: "OS: {env}\n"\ "Python Version: {pyversion}\n"\ "Version of the API: 3.0\n"\ - "SDK Package Version: 0.0.35".\ + "SDK Package Version: 0.0.36".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self) -> List[HostSetting]: diff --git a/vulncheck_sdk/models/__init__.py b/vulncheck_sdk/models/__init__.py index 3f5e0d3..cf982ff 100644 --- a/vulncheck_sdk/models/__init__.py +++ b/vulncheck_sdk/models/__init__.py @@ -324,6 +324,7 @@ from vulncheck_sdk.models.advisory_hcl import AdvisoryHCL from vulncheck_sdk.models.advisory_hik_vision import AdvisoryHIKVision from vulncheck_sdk.models.advisory_hk_cert import AdvisoryHKCert +from vulncheck_sdk.models.advisory_hms import AdvisoryHMS from vulncheck_sdk.models.advisory_hp import AdvisoryHP from vulncheck_sdk.models.advisory_hpe import AdvisoryHPE from vulncheck_sdk.models.advisory_hacktivity import AdvisoryHacktivity @@ -558,6 +559,7 @@ from vulncheck_sdk.models.advisory_range import AdvisoryRange from vulncheck_sdk.models.advisory_ransomware_exploit import AdvisoryRansomwareExploit from vulncheck_sdk.models.advisory_record_type import AdvisoryRecordType +from vulncheck_sdk.models.advisory_red_lion import AdvisoryRedLion from vulncheck_sdk.models.advisory_redhat_cve import AdvisoryRedhatCVE from vulncheck_sdk.models.advisory_reference import AdvisoryReference from vulncheck_sdk.models.advisory_related_rule import AdvisoryRelatedRule @@ -1053,6 +1055,7 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hcl_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hik_vision_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hk_cert_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hms_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hpe_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hp_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hacktivity_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination @@ -1187,6 +1190,7 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qualys_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_red_lion_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_renesas_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_revive_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination diff --git a/vulncheck_sdk/models/advisory_hms.py b/vulncheck_sdk/models/advisory_hms.py new file mode 100644 index 0000000..099d665 --- /dev/null +++ b/vulncheck_sdk/models/advisory_hms.py @@ -0,0 +1,106 @@ +# coding: utf-8 + +""" + VulnCheck API + + Version 3 of the VulnCheck API + + The version of the OpenAPI document: 3.0 + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryHMS(BaseModel): + """ + AdvisoryHMS + """ # noqa: E501 + affected_products: Optional[StrictStr] = None + cve: Optional[List[StrictStr]] = None + date_added: Optional[StrictStr] = None + id: Optional[StrictStr] = None + impact: Optional[StrictStr] = None + mitigation: Optional[StrictStr] = None + summary: Optional[StrictStr] = None + title: Optional[StrictStr] = None + updated_at: Optional[StrictStr] = None + url: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["affected_products", "cve", "date_added", "id", "impact", "mitigation", "summary", "title", "updated_at", "url"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryHMS from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryHMS from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "affected_products": obj.get("affected_products"), + "cve": obj.get("cve"), + "date_added": obj.get("date_added"), + "id": obj.get("id"), + "impact": obj.get("impact"), + "mitigation": obj.get("mitigation"), + "summary": obj.get("summary"), + "title": obj.get("title"), + "updated_at": obj.get("updated_at"), + "url": obj.get("url") + }) + return _obj + + diff --git a/vulncheck_sdk/models/advisory_red_lion.py b/vulncheck_sdk/models/advisory_red_lion.py new file mode 100644 index 0000000..99b2fec --- /dev/null +++ b/vulncheck_sdk/models/advisory_red_lion.py @@ -0,0 +1,96 @@ +# coding: utf-8 + +""" + VulnCheck API + + Version 3 of the VulnCheck API + + The version of the OpenAPI document: 3.0 + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryRedLion(BaseModel): + """ + AdvisoryRedLion + """ # noqa: E501 + cve: Optional[List[StrictStr]] = None + date_added: Optional[StrictStr] = None + title: Optional[StrictStr] = None + updated_at: Optional[StrictStr] = None + url: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["cve", "date_added", "title", "updated_at", "url"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryRedLion from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryRedLion from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "cve": obj.get("cve"), + "date_added": obj.get("date_added"), + "title": obj.get("title"), + "updated_at": obj.get("updated_at"), + "url": obj.get("url") + }) + return _obj + + diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py new file mode 100644 index 0000000..a495025 --- /dev/null +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py @@ -0,0 +1,104 @@ +# coding: utf-8 + +""" + VulnCheck API + + Version 3 of the VulnCheck API + + The version of the OpenAPI document: 3.0 + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, Field, StrictFloat, StrictInt +from typing import Any, ClassVar, Dict, List, Optional, Union +from vulncheck_sdk.models.advisory_hms import AdvisoryHMS +from vulncheck_sdk.models.paginate_pagination import PaginatePagination +from typing import Optional, Set +from typing_extensions import Self + +class RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination(BaseModel): + """ + RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination + """ # noqa: E501 + benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") + meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") + data: Optional[List[AdvisoryHMS]] = None + __properties: ClassVar[List[str]] = ["_benchmark", "_meta", "data"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + # override the default output from pydantic by calling `to_dict()` of meta + if self.meta: + _dict['_meta'] = self.meta.to_dict() + # override the default output from pydantic by calling `to_dict()` of each item in data (list) + _items = [] + if self.data: + for _item_data in self.data: + if _item_data: + _items.append(_item_data.to_dict()) + _dict['data'] = _items + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "_benchmark": obj.get("_benchmark"), + "_meta": PaginatePagination.from_dict(obj["_meta"]) if obj.get("_meta") is not None else None, + "data": [AdvisoryHMS.from_dict(_item) for _item in obj["data"]] if obj.get("data") is not None else None + }) + return _obj + + diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py new file mode 100644 index 0000000..25dbaa8 --- /dev/null +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py @@ -0,0 +1,104 @@ +# coding: utf-8 + +""" + VulnCheck API + + Version 3 of the VulnCheck API + + The version of the OpenAPI document: 3.0 + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, Field, StrictFloat, StrictInt +from typing import Any, ClassVar, Dict, List, Optional, Union +from vulncheck_sdk.models.advisory_red_lion import AdvisoryRedLion +from vulncheck_sdk.models.paginate_pagination import PaginatePagination +from typing import Optional, Set +from typing_extensions import Self + +class RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination(BaseModel): + """ + RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination + """ # noqa: E501 + benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") + meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") + data: Optional[List[AdvisoryRedLion]] = None + __properties: ClassVar[List[str]] = ["_benchmark", "_meta", "data"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + # override the default output from pydantic by calling `to_dict()` of meta + if self.meta: + _dict['_meta'] = self.meta.to_dict() + # override the default output from pydantic by calling `to_dict()` of each item in data (list) + _items = [] + if self.data: + for _item_data in self.data: + if _item_data: + _items.append(_item_data.to_dict()) + _dict['data'] = _items + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "_benchmark": obj.get("_benchmark"), + "_meta": PaginatePagination.from_dict(obj["_meta"]) if obj.get("_meta") is not None else None, + "data": [AdvisoryRedLion.from_dict(_item) for _item in obj["data"]] if obj.get("data") is not None else None + }) + return _obj + + diff --git a/vulncheck_sdk_README.md b/vulncheck_sdk_README.md index 4d7966e..35d6d44 100644 --- a/vulncheck_sdk_README.md +++ b/vulncheck_sdk_README.md @@ -4,7 +4,7 @@ Version 3 of the VulnCheck API This Python package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: 3.0 -- Package version: 0.0.35 +- Package version: 0.0.36 - Generator version: 7.14.0 - Build package: org.openapitools.codegen.languages.PythonClientCodegen @@ -319,6 +319,7 @@ Class | Method | HTTP request | Description *IndicesApi* | [**index_hitachi_energy_get**](docs/IndicesApi.md#index_hitachi_energy_get) | **GET** /index/hitachi-energy | Return vulnerability data stored in index \"hitachi-energy\" *IndicesApi* | [**index_hitachi_get**](docs/IndicesApi.md#index_hitachi_get) | **GET** /index/hitachi | Return vulnerability data stored in index \"hitachi\" *IndicesApi* | [**index_hkcert_get**](docs/IndicesApi.md#index_hkcert_get) | **GET** /index/hkcert | Return vulnerability data stored in index \"hkcert\" +*IndicesApi* | [**index_hms_get**](docs/IndicesApi.md#index_hms_get) | **GET** /index/hms | Return vulnerability data stored in index \"hms\" *IndicesApi* | [**index_honeywell_get**](docs/IndicesApi.md#index_honeywell_get) | **GET** /index/honeywell | Return vulnerability data stored in index \"honeywell\" *IndicesApi* | [**index_hp_get**](docs/IndicesApi.md#index_hp_get) | **GET** /index/hp | Return vulnerability data stored in index \"hp\" *IndicesApi* | [**index_hpe_get**](docs/IndicesApi.md#index_hpe_get) | **GET** /index/hpe | Return vulnerability data stored in index \"hpe\" @@ -462,6 +463,7 @@ Class | Method | HTTP request | Description *IndicesApi* | [**index_qualys_qids_get**](docs/IndicesApi.md#index_qualys_qids_get) | **GET** /index/qualys-qids | Return vulnerability data stored in index \"qualys-qids\" *IndicesApi* | [**index_qubes_qsb_get**](docs/IndicesApi.md#index_qubes_qsb_get) | **GET** /index/qubes-qsb | Return vulnerability data stored in index \"qubes-qsb\" *IndicesApi* | [**index_ransomware_get**](docs/IndicesApi.md#index_ransomware_get) | **GET** /index/ransomware | Return vulnerability data stored in index \"ransomware\" +*IndicesApi* | [**index_red_lion_get**](docs/IndicesApi.md#index_red_lion_get) | **GET** /index/red-lion | Return vulnerability data stored in index \"red-lion\" *IndicesApi* | [**index_redhat_cves_get**](docs/IndicesApi.md#index_redhat_cves_get) | **GET** /index/redhat-cves | Return vulnerability data stored in index \"redhat-cves\" *IndicesApi* | [**index_redhat_get**](docs/IndicesApi.md#index_redhat_get) | **GET** /index/redhat | Return vulnerability data stored in index \"redhat\" *IndicesApi* | [**index_renesas_get**](docs/IndicesApi.md#index_renesas_get) | **GET** /index/renesas | Return vulnerability data stored in index \"renesas\" @@ -901,6 +903,7 @@ Class | Method | HTTP request | Description - [AdvisoryHCL](docs/AdvisoryHCL.md) - [AdvisoryHIKVision](docs/AdvisoryHIKVision.md) - [AdvisoryHKCert](docs/AdvisoryHKCert.md) + - [AdvisoryHMS](docs/AdvisoryHMS.md) - [AdvisoryHP](docs/AdvisoryHP.md) - [AdvisoryHPE](docs/AdvisoryHPE.md) - [AdvisoryHacktivity](docs/AdvisoryHacktivity.md) @@ -1135,6 +1138,7 @@ Class | Method | HTTP request | Description - [AdvisoryRange](docs/AdvisoryRange.md) - [AdvisoryRansomwareExploit](docs/AdvisoryRansomwareExploit.md) - [AdvisoryRecordType](docs/AdvisoryRecordType.md) + - [AdvisoryRedLion](docs/AdvisoryRedLion.md) - [AdvisoryRedhatCVE](docs/AdvisoryRedhatCVE.md) - [AdvisoryReference](docs/AdvisoryReference.md) - [AdvisoryRelatedRule](docs/AdvisoryRelatedRule.md) @@ -1630,6 +1634,7 @@ Class | Method | HTTP request | Description - [RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination.md) + - [RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination.md) @@ -1764,6 +1769,7 @@ Class | Method | HTTP request | Description - [RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination.md) + - [RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination.md) - [RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination](docs/RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination.md)